Skip to content
  1. Aug 02, 2011
  2. Jul 26, 2011
  3. Jul 24, 2011
    • Tim Chen's avatar
      VFS : mount lock scalability for internal mounts · 423e0ab0
      Tim Chen authored
      
      
      For a number of file systems that don't have a mount point (e.g. sockfs
      and pipefs), they are not marked as long term. Therefore in
      mntput_no_expire, all locks in vfs_mount lock are taken instead of just
      local cpu's lock to aggregate reference counts when we release
      reference to file objects.  In fact, only local lock need to have been
      taken to update ref counts as these file systems are in no danger of
      going away until we are ready to unregister them.
      
      The attached patch marks file systems using kern_mount without
      mount point as long term.  The contentions of vfs_mount lock
      is now eliminated.  Before un-registering such file system,
      kern_unmount should be called to remove the long term flag and
      make the mount point ready to be freed.
      
      Signed-off-by: default avatarTim Chen <tim.c.chen@linux.intel.com>
      Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
      423e0ab0
  4. Jul 20, 2011
  5. Jul 14, 2011
  6. Jul 11, 2011
  7. Jul 08, 2011
  8. Jul 07, 2011
  9. Jun 30, 2011
  10. Jun 29, 2011
    • John Johansen's avatar
      AppArmor: Fix masking of capabilities in complain mode · 25e75dff
      John Johansen authored
      
      
      AppArmor is masking the capabilities returned by capget against the
      capabilities mask in the profile.  This is wrong, in complain mode the
      profile has effectively all capabilities, as the profile restrictions are
      not being enforced, merely tested against to determine if an access is
      known by the profile.
      
      This can result in the wrong behavior of security conscience applications
      like sshd which examine their capability set, and change their behavior
      accordingly.  In this case because of the masked capability set being
      returned sshd fails due to DAC checks, even when the profile is in complain
      mode.
      
      Kernels affected: 2.6.36 - 3.0.
      
      Signed-off-by: default avatarJohn Johansen <john.johansen@canonical.com>
      25e75dff
    • John Johansen's avatar
      AppArmor: Fix reference to rcu protected pointer outside of rcu_read_lock · 04fdc099
      John Johansen authored
      
      
      The pointer returned from tracehook_tracer_task() is only valid inside
      the rcu_read_lock.  However the tracer pointer obtained is being passed
      to aa_may_ptrace outside of the rcu_read_lock critical section.
      
      Mover the aa_may_ptrace test into the rcu_read_lock critical section, to
      fix this.
      
      Kernels affected: 2.6.36 - 3.0
      
      Reported-by: default avatarOleg Nesterov <oleg@redhat.com>
      Cc: stable@kernel.org
      Signed-off-by: default avatarJohn Johansen <john.johansen@canonical.com>
      04fdc099
  11. Jun 28, 2011
  12. Jun 27, 2011
Loading