- 29 Aug, 2016 40 commits
-
-
Lukas Braun authored
-
Lukas Braun authored
Previously the strings as received from the user were printed out again, which is not as helpful.
-
Lukas Braun authored
An exact rule only matches if it applies at the end of the path that is being accessed.
-
Lukas Braun authored
A confined process will never change its label and will thus never gain new permissions. Unlike the inherit flag, the confined process does not inherit the permissions of the execing (unconfined) process.
-
Lukas Braun authored
passt_dup_task() initializes all fields, not just ->label.
-
Lukas Braun authored
Add test.
-
Lukas Braun authored
Rename SLSM_ALLOW_* to SLSM_MODE_*. Sysfs interface flags have been altered as follows: 'p' is now path (previously 'f') 'f' is now flags (new, inherit is f=1) 'm' is now mode (previously 'p')
-
Lukas Braun authored
-
Lukas Braun authored
Also fixes wrong return PTR_ERR() in create_passtfs().
-
Lukas Braun authored
Also fixes race conditions with concurrent writes.
-
Lukas Braun authored
-
Lukas Braun authored
-
Lukas Braun authored
Despite being simpler this also handles the inherit flag (and potential future flags) properly.
-
Lukas Braun authored
As far as I can tell, this function was never actually called. The __init suggests it was a remnant of copying from AppArmor, where a similar function is used for cleanup if something goes wrong in aa_create_aafs().
-
Lukas Braun authored
-
Lukas Braun authored
-
Lukas Braun authored
Only hardlinks where the mode for the link is at least as restrictive as for the target are allowed.
-
Lukas Braun authored
-
Simon Ruderich authored
-
Lukas Braun authored
-
Lukas Braun authored
The previous kref scheme was racy, fixes #2.
-
Simon Ruderich authored
-
Simon Ruderich authored
This doesn't prevent bypasses when linking protected files, but allows the user to prevent a program from creating any hard links at all.
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Simon Ruderich authored
Those conditions should never happen and might compromise the security of the system, therefore abort.
-
Simon Ruderich authored
-
Simon Ruderich authored
No longer use FMODE_READ/FMODE_WRITE and MAY_READ/MAY_WRITE/MAY_EXEC and a custom value for the inherit flag which might conflict with other values used by the kernel. Also change type to unsigned to allow more extensions in the future. This is a backwards incompatible change of the values of the "p=" field in the slsm security file system!
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Simon Ruderich authored
Instead pass size_t as pointer to update it and return the (signed) error values.
-
Simon Ruderich authored
Fixes a memory leak where the last rule was not freed.
-
Simon Ruderich authored
-
Simon Ruderich authored
If a single write call fails, the current rules shouldn't be removed. It's possible that the next call might succeed.
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Simon Ruderich authored
-
Frederik Völkel authored
-