<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/security/tomoyo, branch linux-5.1.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-5.1.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-5.1.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2019-02-19T22:17:25Z</updated>
<entry>
<title>tomoyo: Bump version.</title>
<updated>2019-02-19T22:17:25Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@I-love.SAKURA.ne.jp</email>
</author>
<published>2019-02-17T06:52:47Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=861f4bcffcc9d8bca93374ad555801d990cb980c'/>
<id>urn:sha1:861f4bcffcc9d8bca93374ad555801d990cb980c</id>
<content type='text'>
Update URLs and profile version.

Signed-off-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>tomoyo: Allow multiple use_group lines.</title>
<updated>2019-01-24T22:50:27Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@I-love.SAKURA.ne.jp</email>
</author>
<published>2019-01-24T09:37:36Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=4b42564181d683d767b495d7041b1f229468042f'/>
<id>urn:sha1:4b42564181d683d767b495d7041b1f229468042f</id>
<content type='text'>
Being able to specify multiple "use_group" lines makes it
easier to write whitelisted policies.

Signed-off-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>tomoyo: Coding style fix.</title>
<updated>2019-01-24T22:50:27Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@I-love.SAKURA.ne.jp</email>
</author>
<published>2019-01-24T09:37:35Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=cdcf6723add57a0ffb37cfde1ca54a00f5715b71'/>
<id>urn:sha1:cdcf6723add57a0ffb37cfde1ca54a00f5715b71</id>
<content type='text'>
Follow many of recommendations by scripts/checkpatch.pl, and follow
"lift switch variables out of switches" by Kees Cook.
This patch makes no functional change.

Signed-off-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>tomoyo: Swicth from cred-&gt;security to task_struct-&gt;security.</title>
<updated>2019-01-23T19:36:15Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@I-love.SAKURA.ne.jp</email>
</author>
<published>2019-01-19T14:11:40Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=8c6cb983cd52d78ab4e4c0191c73a11dcb60b866'/>
<id>urn:sha1:8c6cb983cd52d78ab4e4c0191c73a11dcb60b866</id>
<content type='text'>
TOMOYO security module is designed to use "struct task_struct"-&gt;security
in order to allow per "struct task_struct" tracking without being disturbed
by unable to update "struct cred"-&gt;security due to override mechanism.

Now that infrastructure-managed security blob is ready, this patch updates
TOMOYO to use "struct task_struct"-&gt;security.

Signed-off-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>LSM: Make lsm_early_cred() and lsm_early_task() local functions.</title>
<updated>2019-01-18T19:44:02Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@I-love.SAKURA.ne.jp</email>
</author>
<published>2019-01-18T10:15:59Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=1cfb2a512e74e577bb0ed7c8d76df90a41a83f6a'/>
<id>urn:sha1:1cfb2a512e74e577bb0ed7c8d76df90a41a83f6a</id>
<content type='text'>
Since current-&gt;cred == current-&gt;real_cred when ordered_lsm_init()
is called, and lsm_early_cred()/lsm_early_task() need to be called
between the amount of required bytes is determined and module specific
initialization function is called, we can move these calls from
individual modules to ordered_lsm_init().

Signed-off-by: Tetsuo Handa &lt;penguin-kernel@I-love.SAKURA.ne.jp&gt;
Acked-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>TOMOYO: Update LSM flags to no longer be exclusive</title>
<updated>2019-01-08T21:18:45Z</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2018-10-12T19:07:39Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=a5e2fe7ede1268d2f80fe49ca1f717d0e3750995'/>
<id>urn:sha1:a5e2fe7ede1268d2f80fe49ca1f717d0e3750995</id>
<content type='text'>
With blob sharing in place, TOMOYO is no longer an exclusive LSM, so it
can operate separately now. Mark it as such.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>Infrastructure management of the cred security blob</title>
<updated>2019-01-08T21:18:44Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2018-11-12T17:30:56Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=bbd3662a834813730912a58efb44dd6df6d952e6'/>
<id>urn:sha1:bbd3662a834813730912a58efb44dd6df6d952e6</id>
<content type='text'>
Move management of the cred security blob out of the
security modules and into the security infrastructre.
Instead of allocating and freeing space the security
modules tell the infrastructure how much space they
require.

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;
[kees: adjusted for ordered init series]
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>TOMOYO: Abstract use of cred security blob</title>
<updated>2019-01-08T21:18:44Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2018-09-22T00:18:07Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=43fc460907dc56a3450654efc6ba1dfbcd4594eb'/>
<id>urn:sha1:43fc460907dc56a3450654efc6ba1dfbcd4594eb</id>
<content type='text'>
Don't use the cred-&gt;security pointer directly.
Provide helper functions that provide the security blob pointer.

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;
[kees: adjusted for ordered init series]
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>LSM: Separate idea of "major" LSM from "exclusive" LSM</title>
<updated>2019-01-08T21:18:43Z</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2018-09-20T02:57:06Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=14bd99c821f7ace0e8110a1bfdfaa27e1788e20f'/>
<id>urn:sha1:14bd99c821f7ace0e8110a1bfdfaa27e1788e20f</id>
<content type='text'>
In order to both support old "security=" Legacy Major LSM selection, and
handling real exclusivity, this creates LSM_FLAG_EXCLUSIVE and updates
the selection logic to handle them.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Reviewed-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>LSM: Lift LSM selection out of individual LSMs</title>
<updated>2019-01-08T21:18:42Z</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2018-09-14T06:17:50Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=f4941d75b9cba5e1fae1aebe0139dcca0703a294'/>
<id>urn:sha1:f4941d75b9cba5e1fae1aebe0139dcca0703a294</id>
<content type='text'>
As a prerequisite to adjusting LSM selection logic in the future, this
moves the selection logic up out of the individual major LSMs, making
their init functions only run when actually enabled. This considers all
LSMs enabled by default unless they specified an external "enable"
variable.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Reviewed-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Reviewed-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
</feed>
