<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/Documentation/admin-guide/LSM, branch v5.8</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v5.8</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v5.8'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2020-06-08T15:30:19Z</updated>
<entry>
<title>Replace HTTP links with HTTPS ones: documentation</title>
<updated>2020-06-08T15:30:19Z</updated>
<author>
<name>Alexander A. Klimov</name>
<email>grandmaster@al2klimov.de</email>
</author>
<published>2020-05-26T06:05:44Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=93431e0607e58a3c997a134adc0fad4fdc147dab'/>
<id>urn:sha1:93431e0607e58a3c997a134adc0fad4fdc147dab</id>
<content type='text'>
Rationale:
Reduces attack surface on kernel devs opening the links for MITM
as HTTPS traffic is much harder to manipulate.

Deterministic algorithm:
For each file:
  For each line:
    If doesn't contain `\bxmlns\b`:
      For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`:
        If both the HTTP and HTTPS versions
        return 200 OK and serve the same content:
          Replace HTTP with HTTPS.

Signed-off-by: Alexander A. Klimov &lt;grandmaster@al2klimov.de&gt;
Link: https://lore.kernel.org/r/20200526060544.25127-1-grandmaster@al2klimov.de
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>docs: SafeSetID.rst: Remove spurious '???' characters</title>
<updated>2019-10-11T15:58:38Z</updated>
<author>
<name>Christian Kujau</name>
<email>lists@nerdbynature.de</email>
</author>
<published>2019-10-11T03:36:16Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0e3901891ab66dce0a51579035594c9b685650dd'/>
<id>urn:sha1:0e3901891ab66dce0a51579035594c9b685650dd</id>
<content type='text'>
It appears that some smart quotes were changed to "???" by even smarter
software; change them to the dumb but legible variety.

Signed-off-by: Christian Kujau &lt;lists@nerdbynature.de&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>security/loadpin: Allow to exclude specific file types</title>
<updated>2019-05-31T20:57:40Z</updated>
<author>
<name>Ke Wu</name>
<email>mikewu@google.com</email>
</author>
<published>2019-05-30T19:22:08Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0ff9848067b7b950a4ed70de7f5028600a2157e3'/>
<id>urn:sha1:0ff9848067b7b950a4ed70de7f5028600a2157e3</id>
<content type='text'>
Linux kernel already provide MODULE_SIG and KEXEC_VERIFY_SIG to
make sure loaded kernel module and kernel image are trusted. This
patch adds a kernel command line option "loadpin.exclude" which
allows to exclude specific file types from LoadPin. This is useful
when people want to use different mechanisms to verify module and
kernel image while still use LoadPin to protect the integrity of
other files kernel loads.

Signed-off-by: Ke Wu &lt;mikewu@google.com&gt;
Reviewed-by: James Morris &lt;jamorris@linux.microsoft.com&gt;
[kees: fix array size issue reported by Coverity via Colin Ian King]
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>LSM: add SafeSetID module that gates setid calls</title>
<updated>2019-01-25T19:22:45Z</updated>
<author>
<name>Micah Morton</name>
<email>mortonm@chromium.org</email>
</author>
<published>2019-01-16T15:46:06Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=aeca4e2ca65c1aeacfbe520684e6421719d99417'/>
<id>urn:sha1:aeca4e2ca65c1aeacfbe520684e6421719d99417</id>
<content type='text'>
SafeSetID gates the setid family of syscalls to restrict UID/GID
transitions from a given UID/GID to only those approved by a
system-wide whitelist. These restrictions also prohibit the given
UIDs/GIDs from obtaining auxiliary privileges associated with
CAP_SET{U/G}ID, such as allowing a user to set up user namespace UID
mappings. For now, only gating the set*uid family of syscalls is
supported, with support for set*gid coming in a future patch set.

Signed-off-by: Micah Morton &lt;mortonm@chromium.org&gt;
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: James Morris &lt;james.morris@microsoft.com&gt;
</content>
</entry>
<entry>
<title>procfs: add smack subdir to attrs</title>
<updated>2019-01-08T21:18:44Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2018-09-22T00:16:59Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=6d9c939dbe4d0bcea09cd4b410f624cde1acb678'/>
<id>urn:sha1:6d9c939dbe4d0bcea09cd4b410f624cde1acb678</id>
<content type='text'>
Back in 2007 I made what turned out to be a rather serious
mistake in the implementation of the Smack security module.
The SELinux module used an interface in /proc to manipulate
the security context on processes. Rather than use a similar
interface, I used the same interface. The AppArmor team did
likewise. Now /proc/.../attr/current will tell you the
security "context" of the process, but it will be different
depending on the security module you're using.

This patch provides a subdirectory in /proc/.../attr for
Smack. Smack user space can use the "current" file in
this subdirectory and never have to worry about getting
SELinux attributes by mistake. Programs that use the
old interface will continue to work (or fail, as the case
may be) as before.

The proposed S.A.R.A security module is dependent on
the mechanism to create its own attr subdirectory.

The original implementation is by Kees Cook.

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security</title>
<updated>2019-01-02T18:56:09Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2019-01-02T18:56:09Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=19f2e267a5d0d26282a64f8f788c482852c95324'/>
<id>urn:sha1:19f2e267a5d0d26282a64f8f788c482852c95324</id>
<content type='text'>
Pull smack updates from James Morris:
 "Two Smack patches for 4.21.

  Jose's patch adds missing documentation and Zoran's fleshes out the
  access checks on keyrings"

* 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  Smack: Improve Documentation
  smack: fix access permissions for keyring
</content>
</entry>
<entry>
<title>Smack: Improve Documentation</title>
<updated>2018-12-13T21:31:01Z</updated>
<author>
<name>José Bollo</name>
<email>jobol@nonadev.net</email>
</author>
<published>2018-12-13T21:31:01Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=55b078f031f556ea18963bd808e79a1dfaa4be44'/>
<id>urn:sha1:55b078f031f556ea18963bd808e79a1dfaa4be44</id>
<content type='text'>
Add some words about the mount option "smackfstransmute=label".

Signed-off-by: José Bollo &lt;jobol@nonadev.net&gt;
Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>Documentation: Update SELinux reference policy URL</title>
<updated>2018-11-19T17:40:48Z</updated>
<author>
<name>Petr Vorel</name>
<email>pvorel@suse.cz</email>
</author>
<published>2018-11-17T06:25:55Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0427612cddef07568ba80596a02089181092783d'/>
<id>urn:sha1:0427612cddef07568ba80596a02089181092783d</id>
<content type='text'>
Signed-off-by: Petr Vorel &lt;pvorel@suse.cz&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
</content>
</entry>
<entry>
<title>yama: clarify ptrace_scope=2 in Yama documentation</title>
<updated>2018-10-07T15:16:38Z</updated>
<author>
<name>Yves-Alexis Perez</name>
<email>corsac@corsac.net</email>
</author>
<published>2018-10-02T20:47:23Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=31527da5d673ed16255869b6d0f209285b8b0981'/>
<id>urn:sha1:31527da5d673ed16255869b6d0f209285b8b0981</id>
<content type='text'>
Current phrasing is ambiguous since it's unclear if attaching to a
children through PTRACE_TRACEME requires CAP_SYS_PTRACE. Rephrase the
sentence to make that clear.

Signed-off-by: Yves-Alexis Perez &lt;corsac@corsac.net&gt;
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>apparmor: update git and wiki locations in AppArmor docs</title>
<updated>2018-06-07T08:50:47Z</updated>
<author>
<name>Jordan Glover</name>
<email>Golden_Miller83@protonmail.ch</email>
</author>
<published>2018-05-05T12:22:16Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b896c54e8d7bbf6d5d48f9296b26c9d3f10ec795'/>
<id>urn:sha1:b896c54e8d7bbf6d5d48f9296b26c9d3f10ec795</id>
<content type='text'>
The apparmor information in the apparmor.rst  file is out of date.
Update it to the correct git reference for the master apparmor tree.
Update the wiki location to use apparmor.net which forwards to the
current wiki location on gitlab.com. Update user space tools address
to gitlab.com.

Signed-off-by: Jordan Glover &lt;Golden_Miller83@protonmail.ch&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
</feed>
