On 4/8/2021 1:49 AM, Zhongjun Tan wrote:
> From: Zhongjun Tan
>
> Delete selinux selinux_xfrm_policy_lookup() useless argument.
>
> Signed-off-by: Zhongjun Tan
> ---
> include/linux/lsm_hook_defs.h | 3 +--
> include/linux/security.h| 4 ++--
> net/xfrm/xfrm_policy.c | 6 ++---
en though it may not actually do so.
Signed-off-by: Casey Schaufler
To: p...@paul-moore.com
To: linux-au...@redhat.com
To: r...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 2 +-
include/linux/audit.h | 24
include/linux/security.h
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Pablo Neira Ayuso
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
Cc
: Paul Moore
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c | 12 +-
include/linux/security.h | 7 ++--
kernel/audit.c| 16 +++-
kernel
a secid to a string, as can occur in the
audit code.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
To: Paul Moore
---
drivers/android/binder.c| 12 +-
include/linux
lsmblob.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
---
include/linux/security.h | 26 ++--
kernel/cred.c | 4 +---
net/netfilter/nft_meta.c | 10
net/netfilter
lsmblob.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
---
include/linux/security.h | 26 ++--
kernel/cred.c | 4 +---
net/netfilter/nft_meta.c | 10
net/netfilter
a secid to a string, as can occur in the
audit code.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
To: Paul Moore
---
drivers/android/binder.c| 12 +-
include/linux
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux
en though it may not actually do so.
Signed-off-by: Casey Schaufler
To: p...@paul-moore.com
To: linux-au...@redhat.com
To: r...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 2 +-
include/linux/audit.h | 24
include/linux/security.h
: Paul Moore
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c | 12 +-
include/linux/security.h | 7 ++--
kernel/audit.c| 16 +++-
kernel
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Pablo Neira Ayuso
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
Cc
en though it may not actually do so.
Signed-off-by: Casey Schaufler
To: p...@paul-moore.com
Cc: linux-au...@redhat.com
Cc: r...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 2 +-
include/linux/audit.h | 24 +
incl
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Pablo Neira Ayuso
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
Cc
: Paul Moore
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c | 12 +-
include/linux/security.h | 7 ++--
kernel/audit.c| 16 +++-
kernel
a secid to a string, as can occur in the
audit code.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
To: Paul Moore
---
drivers/android/binder.c| 12 +-
include/linux
lsmblob.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
To: Pablo Neira Ayuso
---
include/linux/security.h | 26 ++--
kernel/cred.c | 4 +---
net/netfilter/nft_meta.c | 10
net/netfilter
en though it may not actually do so.
Signed-off-by: Casey Schaufler
Cc: linux-au...@redhat.com
Cc: p...@paul-moore.com
Cc: r...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 2 +-
include/linux/audit.h | 24
include/linux/security.h
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
---
net/netfilter
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
Cc
: Paul Moore
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c | 12 +-
include/linux/security.h | 7 ++--
kernel/audit.c| 16 +++-
kernel
a secid to a string, as can occur in the
audit code.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
---
drivers/android/binder.c| 12 +-
include/linux/security.h| 5 +++--
include/net/scm.h | 7
lsmblob.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 26 ++--
kernel/cred.c | 4 +---
net/netfilter/nft_meta.c | 10
net/netfilter/xt_SECMARK.c| 7 +-
net/netlabel
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
Cc
: Paul Moore
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: linux-au...@redhat.com
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c | 12 +-
include/linux/security.h | 7 ++--
kernel/audit.c| 16 +++-
kernel
a secid to a string, as can occur in the
audit code.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: linux-au...@redhat.com
---
drivers/android/binder.c| 12 +-
include/linux/security.h| 5 +++--
include/net/scm.h | 7
lsmblob.
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 26 ++--
kernel/cred.c | 4 +---
net/netfilter/nft_meta.c | 10
net/netfilter/xt_SECMARK.c| 7 +-
net/netlabel
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
Cc: netfilter-de...@vger.kernel.org
---
net/netfilter
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include/net/scm.h
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
--
On 9/30/2020 5:20 AM, Richard Haines wrote:
> On Wed, 2020-09-30 at 12:17 +0200, Pablo Neira Ayuso wrote:
>
>> Why do you need this?
> I don't actually have a use for this, I only did it out of idle
> curiosity. If it is useful to the community then okay. Given the
> attemped move to Open 5G I
es the problem of
> the LSM hook callers sending the wrong secid which would be much
> worse.
>
> Reported-by: Herbert Xu
> Signed-off-by: Paul Moore
For what it may be worth
Acked-by: Casey Schaufler
> ---
> include/linux/lsm_hook_defs.h |2 +-
> include/linu
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4/cipso_ipv4.c
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
cc: netdev@vger.kernel.org
---
net/netfilter/nfnetlink_queue.c | 31
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include/net/scm.h
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
--
is
scaffolding where interfaces have yet to be converted.
Reviewed-by: Kees Cook
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 30 +++
include/net/scm.h | 7 +--
kernel/cred.c
On 7/28/2020 4:11 AM, John Johansen wrote:
> On 7/24/20 1:32 PM, Casey Schaufler wrote:
>> Change security_secctx_to_secid() to fill in a lsmblob instead
>> of a u32 secid. Multiple LSMs may be able to interpret the
>> string, and this allows for setting whichever secid is
&
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4/cipso_ipv4.c
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
cc: netdev@vger.kernel.org
---
net/netfilter/nfnetlink_queue.c | 31
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include/net/scm.h
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
--
is
scaffolding where interfaces have yet to be converted.
Reviewed-by: Kees Cook
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 30 +++
include/net/scm.h | 7 +--
kernel/cred.c
On 7/9/2020 9:28 AM, John Johansen wrote:
> On 7/9/20 9:11 AM, Stephen Smalley wrote:
>> On Wed, Jul 8, 2020 at 8:23 PM Casey Schaufler
>> wrote:
>>> Change the data used in UDS SO_PEERSEC processing from a
>>> secid to a more g
netlabel use the lsm_id.slot to access the
correct secid when using netlabel.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/net/netlabel.h | 8 +--
net/ipv4/cipso_ipv4.c
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
cc: netdev@vger.kernel.org
---
net/netfilter/nfnetlink_queue.c | 31
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include/net/scm.h
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
--
is
scaffolding where interfaces have yet to be converted.
Reviewed-by: Kees Cook
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 30 +++
include/net/scm.h | 7 +--
kernel/cred.c
guarantee
that the addition of other data to the unix_skb_parms or
support for additional security modules wouldn't exceed what
is available.
Reviewed-by: Kees Cook
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
include/linux/security.h | 7 +--
include/net/af_unix.h
On 5/18/2020 2:43 PM, Schaufler, Casey wrote:
>> -Original Message-
>> From: linux-kernel-ow...@vger.kernel.org > ow...@vger.kernel.org> On Behalf Of Arnd Bergmann
>> Sent: Saturday, May 16, 2020 1:05 AM
>> To: Alexei Starovoitov
>> Cc: James Morris ; Anders Roxell
>> ; Alexei Starovoitov
Change netlink netfilter interfaces to use lsmcontext
pointers, and remove scaffolding.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
cc: netdev@vger.kernel.org
---
net/netfilter/nfnetlink_queue.c | 31
new structure.
Reviewed-by: Kees Cook
Acked-by: Stephen Smalley
Acked-by: Paul Moore
Signed-off-by: Casey Schaufler
Cc: netdev@vger.kernel.org
---
drivers/android/binder.c| 26 +++-
include/linux/security.h| 4 +--
include/net/scm.h
allocates and destroys
them on each use, whereas Smack provides a pointer to an entry
in a list that never goes away.
Reviewed-by: Kees Cook
Reviewed-by: John Johansen
Acked-by: Stephen Smalley
Signed-off-by: Casey Schaufler
Cc: linux-integr...@vger.kernel.org
Cc: netdev@vger.kernel.org
--
guarantee
that the addition of other data to the unix_skb_parms or
support for additional security modules wouldn't exceed what
is available.
Reviewed-by: Kees Cook
Signed-off-by: Casey Schaufler
cc: netdev@vger.kernel.org
---
include/linux/security.h | 7 +--
include/net/af_unix.h
On 5/8/2020 2:53 PM, Alexei Starovoitov wrote:
> From: Alexei Starovoitov
>
> v4->v5:
>
> Split BPF operations that are allowed under CAP_SYS_ADMIN into combination of
> CAP_BPF, CAP_PERFMON, CAP_NET_ADMIN and keep some of them under CAP_SYS_ADMIN.
>
> The user process has to have
> - CAP_BPF and
On 8/22/2019 3:36 PM, David Miller wrote:
> From: Casey Schaufler
> Date: Thu, 22 Aug 2019 15:34:44 -0700
>
>> On 8/22/2019 3:28 PM, David Miller wrote:
>>> From: Casey Schaufler
>>> Date: Thu, 22 Aug 2019 14:59:37 -0700
>>>
>>>> Sure, you
On 8/22/2019 3:28 PM, David Miller wrote:
> From: Casey Schaufler
> Date: Thu, 22 Aug 2019 14:59:37 -0700
>
>> Sure, you *can* do that, but it would be insane to do so.
> We look up the neighbour table entries on every single packet we
> transmit from the kernel in the same
On 8/22/2019 2:18 PM, David Miller wrote:
> From: Casey Schaufler
> Date: Thu, 22 Aug 2019 13:35:01 -0700
>
>> If the secmark where replaced by a security blob, the u32 secmark field
>> in an sk_buff would be replaced by a void * security field.
> You can already use the
On 8/22/2019 1:15 PM, Florian Westphal wrote:
> Casey Schaufler wrote:
>> Given that the original objection to using a skb extension for a
>> security blob was that an extension is dynamic, and that the ubiquitous
>> nature of LSM use makes that unreasonable, it would seem t
On 8/22/2019 9:32 AM, Paul Moore wrote:
> On Thu, Aug 22, 2019 at 3:03 AM Florian Westphal wrote:
>> Paul Moore wrote:
>>> Hello netdev,
>>>
>>> I was just made aware of the skb extension work, and it looks very
>>> appealing from a LSM perspective. As some of you probably remember,
>>> we (the
On 8/21/2019 8:54 PM, David Miller wrote:
> From: Paul Moore
> Date: Wed, 21 Aug 2019 23:27:03 -0400
>
>> On Wed, Aug 21, 2019 at 6:50 PM David Miller wrote:
>>> From: Paul Moore
>>> Date: Wed, 21 Aug 2019 18:00:09 -0400
>>>
I was just made aware of the skb extension work, and it looks very
On 8/21/2019 6:45 AM, Jeff Vander Stoep wrote:
> MAC addresses are often considered sensitive because they are
> usually unique and can be used to identify/track a device or
> user [1].
>
> The MAC address is accessible via the RTM_NEWLINK message type of a
> netlink route socket[2]. Ideally we cou
On 4/11/2019 4:31 AM, Tetsuo Handa wrote:
On 2019/04/04 13:49, David Miller wrote:
From: Tetsuo Handa
Date: Wed, 3 Apr 2019 06:07:40 +0900
On 2019/04/03 5:23, David Miller wrote:
Please fix RDS and other protocols to examine the length properly
instead.
Do you prefer adding branches only fo
On 1/4/2019 11:38 AM, Eric Dumazet wrote:
> On Fri, Jan 4, 2019 at 11:36 AM Casey Schaufler
> wrote:
>> On 1/4/2019 11:00 AM, Eric Dumazet wrote:
>>> syzbot was able to crash one host with the following stack trace :
>>>
>>> kasan: GPF could be caused
> Fixes: d66a8acbda92 ("Smack: Inform peer that IPv6 traffic has been blocked")
> Signed-off-by: Eric Dumazet
> Cc: Piotr Sawicki
> Cc: Casey Schaufler
> Reported-by: syzbot
> ---
> net/ipv6/icmp.c | 8 ++--
> 1 file changed
n't look like it will cause any problems.
I've only been able to test it in a general way. I
haven't created specific tests, but it passes the
usual Smack use cases.
Acked-by: Casey Schaufler
> ---
> security/smack/smack_lsm.c | 22 ++
> 1 file change
On 4/23/2018 6:30 AM, David Herrmann wrote:
> Hi
>
> This series adds a new LSM hook for the socketpair(2) syscall. The idea
> is to allow SO_PEERSEC to be called on AF_UNIX sockets created via
> socketpair(2), and return the same information as if you emulated
> socketpair(2) via a temporary liste
On 4/18/2018 5:46 PM, Paul Moore wrote:
> On Wed, Apr 18, 2018 at 8:41 PM, Casey Schaufler
> wrote:
>> On 4/18/2018 4:47 PM, Paul Moore wrote:
>>> On Fri, Mar 16, 2018 at 5:00 AM, Richard Guy Briggs wrote:
>>>> Implement the proc fs write to set th
On 4/18/2018 4:47 PM, Paul Moore wrote:
> On Fri, Mar 16, 2018 at 5:00 AM, Richard Guy Briggs wrote:
>> Implement the proc fs write to set the audit container ID of a process,
>> emitting an AUDIT_CONTAINER record to document the event.
>> ...
>>
>> diff --git a/include/linux/sched.h b/include/lin
On 2/27/2018 9:36 AM, Andy Lutomirski wrote:
> On Tue, Feb 27, 2018 at 5:30 PM, Casey Schaufler
> wrote:
>> On 2/27/2018 8:39 AM, Andy Lutomirski wrote:
>>> On Tue, Feb 27, 2018 at 5:32 AM, Alexei Starovoitov
>>> wrote:
>>>> [ Snip ]
>>> A
On 2/27/2018 8:39 AM, Andy Lutomirski wrote:
> On Tue, Feb 27, 2018 at 5:32 AM, Alexei Starovoitov
> wrote:
>> [ Snip ]
> An earlier version of the patch set used the seccomp filter chain.
> Mickaël, what exactly was wrong with that approach other than that the
> seccomp() syscall was awkward for
On 2/2/2018 3:24 PM, Paul Moore wrote:
> On Fri, Feb 2, 2018 at 5:19 PM, Simo Sorce wrote:
>> On Fri, 2018-02-02 at 16:24 -0500, Paul Moore wrote:
>>> On Wed, Jan 10, 2018 at 2:00 AM, Richard Guy Briggs wrote:
On 2018-01-09 11:18, Simo Sorce wrote:
> On Tue, 2018-01-09 at 07:16 -0500, Ri
On 12/22/2017 5:05 AM, Marcelo Ricardo Leitner wrote:
> From: Richard Haines
>
> The SCTP security hooks are explained in:
> Documentation/security/LSM-sctp.rst
>
> Signed-off-by: Richard Haines
> Acked-by: Marcelo Ricardo Leitner
> ---
> Documentation/security/LSM-sctp.rst | 194
> +++
On 12/11/2017 8:30 AM, Eric Paris wrote:
> On Sat, 2017-12-09 at 10:28 -0800, Casey Schaufler wrote:
>> Because a container doesn't have to use namespaces to be a container
>> you still need a mechanism for a process to declare that it is in
>> fact
>> in a containe
On 12/9/2017 2:20 AM, Micka�l Sala�n wrote:
> On 12/10/2017 18:33, Casey Schaufler wrote:
>> On 10/12/2017 7:14 AM, Richard Guy Briggs wrote:
>>> Containers are a userspace concept. The kernel knows nothing of them.
>>>
>>> The Linux audit system needs a w
On 11/30/2017 9:57 AM, Eric Dumazet wrote:
> On Thu, 2017-11-30 at 10:30 -0700, David Ahern wrote:
>> On 11/30/17 8:44 AM, David Ahern wrote:
>>> On 11/30/17 3:50 AM, Eric Dumazet wrote:
@@ -1631,24 +1659,6 @@ int tcp_v4_rcv(struct sk_buff *skb)
th = (const struct tcphdr *)skb->
On 11/30/2017 2:50 AM, Eric Dumazet wrote:
> On Wed, 2017-11-29 at 19:16 -0800, Casey Schaufler wrote:
>> On 11/29/2017 4:31 PM, James Morris wrote:
>>> On Wed, 29 Nov 2017, Casey Schaufler wrote:
>>>
>>>> I see that there is a proposed fix later in the thre
On 11/30/2017 2:50 AM, Eric Dumazet wrote:
> On Wed, 2017-11-29 at 19:16 -0800, Casey Schaufler wrote:
>> On 11/29/2017 4:31 PM, James Morris wrote:
>>> On Wed, 29 Nov 2017, Casey Schaufler wrote:
>>>
>>>> I see that there is a proposed fix later in the thre
On 11/29/2017 4:31 PM, James Morris wrote:
> On Wed, 29 Nov 2017, Casey Schaufler wrote:
>
>> I see that there is a proposed fix later in the thread, but I don't see
>> the patch. Could you send it to me, so I can try it on my problem?
> Forwarded off-list.
The patch
On 11/29/2017 2:26 AM, James Morris wrote:
> I'm seeing a kernel stack corruption bug (detected via gcc) when running
> the SELinux testsuite on a 4.15-rc1 kernel, in the 2nd inet_socket test:
>
> https://github.com/SELinuxProject/selinux-testsuite/blob/master/tests/inet_socket/test
>
> # Verify
On 10/18/2017 5:05 PM, Richard Guy Briggs wrote:
> On 2017-10-17 01:10, Casey Schaufler wrote:
>> On 10/16/2017 5:33 PM, Richard Guy Briggs wrote:
>>> On 2017-10-12 16:33, Casey Schaufler wrote:
>>>> On 10/12/2017 7:14 AM, Richard Guy Briggs wrote:
>>>>
On 10/17/2017 8:44 AM, James Bottomley wrote:
> On Tue, 2017-10-17 at 11:28 -0400, Simo Sorce wrote:
>>> Without a *kernel* policy on containerIDs you can't say what
>>> security policy is being exempted.
>> The policy has been basically stated earlier.
>>
>> A way to track a set of processes from
On 10/17/2017 8:28 AM, Simo Sorce wrote:
> On Tue, 2017-10-17 at 07:59 -0700, Casey Schaufler wrote:
>> On 10/17/2017 5:31 AM, Simo Sorce wrote:
>>> On Mon, 2017-10-16 at 21:42 -0400, Steve Grubb wrote:
>>>> On Monday, October 16, 2017 8:33:40 PM EDT Richard Guy Bri
On 10/17/2017 5:31 AM, Simo Sorce wrote:
> On Mon, 2017-10-16 at 21:42 -0400, Steve Grubb wrote:
>> On Monday, October 16, 2017 8:33:40 PM EDT Richard Guy Briggs wrote:
>>> There is such a thing, but the kernel doesn't know about it
>>> yet. This same situation exists for loginuid and sessionid wh
On 10/16/2017 5:33 PM, Richard Guy Briggs wrote:
> On 2017-10-12 16:33, Casey Schaufler wrote:
>> On 10/12/2017 7:14 AM, Richard Guy Briggs wrote:
>>> Containers are a userspace concept. The kernel knows nothing of them.
>>>
>>> The Linux audit system needs a w
On 10/12/2017 7:14 AM, Richard Guy Briggs wrote:
> Containers are a userspace concept. The kernel knows nothing of them.
>
> The Linux audit system needs a way to be able to track the container
> provenance of events and actions. Audit needs the kernel's help to do
> this.
>
> Since the concept o
Adding the LSM list to the thread.
On 8/25/2017 11:01 AM, Jeffrey Vander Stoep via Selinux wrote:
> I’d like to get your thoughts on adding LSM permission checks on BPF objects.
Aside from the use of these objects requiring privilege,
what sort of controls do you think might be reasonable?
Who "o
1 - 100 of 130 matches
Mail list logo