Re: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning

2021-03-24 Thread James Morris
s. > > Add a separate NULL check to tell gcc about it as well. > > Signed-off-by: Arnd Bergmann Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git fixes-v5.12 -- James Morris

Re: [PATCH net-next 1/3] security: add const qualifier to struct sock in various places

2020-12-03 Thread James Morris
gt; --- > > The code churn is unfortunate. Alternative would be to change > > the function signature of ->route_req: > > struct dst_entry *(*route_req)(struct sock *sk, ... > > [ i.e., drop 'const' ]. Thoughts? > > Security folks - is this

Re: [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks

2020-11-19 Thread James Morris
replace the flowi pointers with pointers > to the address family independent flowi_common struct. > > Reported-by: Herbert Xu > Signed-off-by: Paul Moore Acked-by: James Morris -- James Morris

Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()

2020-11-13 Thread James Morris
clist()") > Reported-by: Dan Carpenter > Signed-off-by: Paul Moore Reviewed-by: James Morris > --- > net/netlabel/netlabel_unlabeled.c |2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/netlabel/netlabel_unlabeled.c > b/ne

Re: [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter

2020-11-10 Thread James Morris
(skb, ct, ctinfo, NFQA_CT, NFQA_CT_INFO) < 0) > > @@ -632,10 +627,8 @@ nfqnl_build_packet_message(struct net *net, struct > > nfqnl_instance *queue, > > } > > > > nlh->nlmsg_len = skb->len; > > - if (seclen) { > > - lsmcontext_init(&scaff, secdata, seclen, 0); > > - security_release_secctx(&scaff); > > - } > > + if (context.len) > > + security_release_secctx(&context); > > return skb; > > > > nla_put_failure: > > @@ -643,10 +636,8 @@ nfqnl_build_packet_message(struct net *net, struct > > nfqnl_instance *queue, > > kfree_skb(skb); > > net_err_ratelimited("nf_queue: error creating packet message\n"); > > nlmsg_failure: > > - if (seclen) { > > - lsmcontext_init(&scaff, secdata, seclen, 0); > > - security_release_secctx(&scaff); > > - } > > + if (context.len) > > + security_release_secctx(&context); > > return NULL; > > } > > > > -- > > 2.24.1 > > > -- James Morris

Re: [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx

2020-11-09 Thread James Morris
ntainers on the To: line or they may miss the email. -- James Morris

Re: [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid

2020-11-09 Thread James Morris
ng back a secid. > The infrastructure passes the correct entry from the lsmblob. > > Signed-off-by: Casey Schaufler > Cc: netdev@vger.kernel.org You probably need to include Netfilter maintainers specifically for this (added them + the Netfilter list). This also needs signoffs from LSM owners. -- James Morris

Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow

2020-10-28 Thread James Morris
On Tue, 27 Oct 2020, Paul Moore wrote: > On Wed, Sep 30, 2020 at 9:44 AM Paul Moore wrote: > > On Tue, Sep 29, 2020 at 7:09 PM James Morris wrote: > > > I'm not keen on adding a parameter which nobody is using. Perhaps a note > > > in the header instead? > &g

Re: [PATCH] vsock: use ns_capable_noaudit() on socket create

2020-10-26 Thread James Morris
it version. > > Reported-by: Roman Kiryanov > https://android-review.googlesource.com/c/device/generic/goldfish/+/1468545/ > Signed-off-by: Jeff Vander Stoep Reviewed-by: James Morris -- James Morris

Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow

2020-09-29 Thread James Morris
es the problem of > the LSM hook callers sending the wrong secid which would be much > worse. > > Reported-by: Herbert Xu > Signed-off-by: Paul Moore I'm not keen on adding a parameter which nobody is using. Perhaps a note in the header instead? -- James Morris

Re: [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter

2020-07-27 Thread James Morris
ger.kernel.org I'd like to see Paul's acks on any networking related changes. -- James Morris

Re: [PATCH] security: fix the default value of secid_to_secctx hook

2020-05-14 Thread James Morris
x/lsm_hook_defs.h > > @@ -243,7 +243,7 @@ LSM_HOOK(int, -EINVAL, getprocattr, struct task_struct > > *p, char *name, > > char **value) > > LSM_HOOK(int, -EINVAL, setprocattr, const char *name, void *value, size_t > > size) > > LSM_HOOK(int, 0, ismaclabel, const char *name) > > -LSM_HOOK(int, 0, secid_to_secctx, u32 secid, char **secdata, > > +LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata, > > u32 *seclen) > > LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 > > *secid) > > LSM_HOOK(void, LSM_RET_VOID, release_secctx, char *secdata, u32 seclen) > > -- > > 2.20.1 > > > -- James Morris

Re: [PATCH] security: fix the default value of secid_to_secctx hook

2020-05-14 Thread James Morris
> Thank you Arnd for helping me figure out what went wrong. > > CC: Arnd Bergmann > Fixes: 98e828a0650f ("security: Refactor declaration of LSM hooks") > Signed-off-by: Anders Roxell Note, this patch should have been sent to me and cc'd the LSM list. Acked-by: James Morris -- James Morris

Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode

2019-06-27 Thread James Morris
another security > module to take over lockdown decisions once it has initialized (including > policy load), and to be able to access state that is currently private to the > lockdown module, like the level. Why not utilize stacking (restrictively), similarly to capabilities? -- James Morris

Re: [PATCH v2 0/4] Introduce LSM-hook for socketpair(2)

2018-05-04 Thread James Morris
On Fri, 4 May 2018, David Herrmann wrote: > Hi > > This is v2 of the socketpair(2) LSM hook introduction. Thanks, all applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-general -- James Morris

Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)

2018-04-25 Thread James Morris
On Wed, 25 Apr 2018, Paul Moore wrote: > On Wed, Apr 25, 2018 at 2:44 PM, James Morris wrote: > > On Mon, 23 Apr 2018, David Herrmann wrote: > >> This patch series tries to close this gap and makes both behave the > >> same. A new LSM-hook is added which allow

Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)

2018-04-25 Thread James Morris
ck backend and maybe the hook name change, I'll merge this unless DaveM wants it to go in via his networking tree. -- James Morris

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-30 Thread James Morris
On Thu, 30 Nov 2017, Eric Dumazet wrote: > On Wed, 2017-11-29 at 19:16 -0800, Casey Schaufler wrote: > > On 11/29/2017 4:31 PM, James Morris wrote: > > > On Wed, 29 Nov 2017, Casey Schaufler wrote: > > > > > > > I see that there is a proposed fix later

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
On Wed, 29 Nov 2017, Casey Schaufler wrote: > I see that there is a proposed fix later in the thread, but I don't see > the patch. Could you send it to me, so I can try it on my problem? Forwarded off-list. Interestingly, I didn't see the KASAN output email from Stephen here. -- James Morris

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
skb)->header.h4, IPCB(skb), > > sizeof(struct inet_skb_parm)); > > Please try this fix for IPv4 (a similar patch will be needed for IPv6) > > net/ipv4/tcp_ipv4.c | 51 ++ > 1 file changed, 32 insertions(+), 19 deletions(-) Works for me, no crashes with the testsuite running in a loop. Tested-by: James Morris -- James Morris

[BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
net: sk_buff rbnode reorg ... Anyone else able to reproduce this, or have any ideas on what's happening? - James -- James Morris

Re: [PATCH v5 next 0/5] Improve Module autoloading infrastructure

2017-11-27 Thread James Morris
itelist to /proc (per-task) or /sys/fs (global) ? The per-task whitelist is inherited from the global one by default, or from a parent process if it's been modified in the parent. -- James Morris

Re: [PATCH v5 next 0/5] Improve Module autoloading infrastructure

2017-11-27 Thread James Morris
!capable(CAP_NET_ADMIN) || !unprivileged_autoload(module_name))) return -EPERM; -- James Morris

Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks

2017-10-19 Thread James Morris
not an expert on SCTP. It would be good to see more review from networking folk. Reviewed-by: James Morris -- James Morris

Re: [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive

2017-10-19 Thread James Morris
configured. > > Signed-off-by: Chenbo Feng > Acked-by: Stephen Smalley Reviewed-by: James Morris -- James Morris

Re: [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations

2017-10-19 Thread James Morris
ject, > selinux will check if processes have the right privileges. The creation > of eBPF object are also checked at the general bpf check hook and new > cmd introduced to eBPF domain can also be checked there. > > Signed-off-by: Chenbo Feng > Acked-by: Alexei Starovoitov Revi

Re: [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall

2017-10-19 Thread James Morris
ual security module can decide which command need to be checked and > how the cmd should be checked. > > Signed-off-by: Chenbo Feng Acked-by: James Morris -- James Morris

Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control

2017-10-18 Thread James Morris
On Wed, 18 Oct 2017, David Miller wrote: > Series applied. I hadn't gotten to reviewing this patchset yet. Please wait for more acks/reviews from LSM folk for things touching security/, next time. -- James Morris

Re: [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall

2017-10-11 Thread James Morris
On Wed, 4 Oct 2017, Chenbo Feng wrote: > int bpf_map_new_fd(struct bpf_map *map, int flags) > { > + if (security_bpf_map(map, OPEN_FMODE(flags))) > + return -EPERM; > + Don't hardcode -EPERM here, return the actual error from security_bpf_map(). > + if (security_bpf_prog(p

Re: [PATCH net-next v7 04/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()

2017-08-27 Thread James Morris
abstract FS struct */ > }; Looks like a spurious empty line. -- James Morris

Re: [kernel-hardening] Re: [PATCH net-next v7 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier

2017-08-27 Thread James Morris
th an ABI version, the user can > easily check if the current kernel support that. Don't call it an ABI, perhaps minimum policy version (similar to what SELinux does). Changes need to be made so that any existing userspace still works. -- James Morris

Re: [PATCH net-next v7 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier

2017-08-27 Thread James Morris
On Tue, 22 Aug 2017, Alexei Starovoitov wrote: > more general question: what is the status of security/ bits? > I'm assuming they still need to be reviewed and explicitly acked by James, > right? Yep, along with other core security developers where possible. -- James Morris

Re: [kernel-hardening] [PATCH net-next v7 00/10] Landlock LSM: Toward unprivileged sandboxing

2017-08-27 Thread James Morris
is > missing is a way to enforce a security policy for any application by its > developer and *unprivileged user* as seccomp can do for raw syscall filtering. > You could mention here that the first case is Mandatory Access Control, in general terms. -- James Morris

Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information

2017-08-10 Thread James Morris
; > +F: include/net/netlabel.h > > +F: include/uapi/linux/netfilter/xt_SECMARK.h > > +F: include/uapi/linux/netfilter/xt_CONNSECMARK.h > > +F: net/netlabel/ > > +F: net/ipv4/cipso_ipv4.c > > +F: net/ipv6/calipso.c > > +F: net/netfilter/xt_CONNSECMARK.c > > +F: net/netfilter/xt_SECMARK.c > > > > NETWORKING [TLS] > > M: Ilya Lesokhin > > -- James Morris

Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information

2017-08-10 Thread James Morris
On Thu, 10 Aug 2017, Paul Moore wrote: > From: Paul Moore > > Signed-off-by: Paul Moore Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next -- James Morris

Re: [PATCH v5 03/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()

2017-03-01 Thread James Morris
e to breaking Landlock policies. > @@ -82,6 +87,8 @@ enum bpf_arg_type { > > ARG_PTR_TO_CTX, /* pointer to context */ > ARG_ANYTHING, /* any (initialized) argument is ok */ > + > + ARG_CONST_PTR_TO_HANDLE_FS, /* pointer to an abstract FS struct */ > }; Extraneous whitespace? -- James Morris

Re: [PATCH 0/2] Quiet noisy LSM denial when accessing net sysctl

2016-06-02 Thread James Morris
t; Hello - Just checking in again to see if you plan on taking these > through the security tree? Sure, please resend. -- James Morris

Re: [v3] skbuff: Do not scrub skb mark within the same name space

2015-04-16 Thread James Morris
; or cleared across tunnels within the same name space? In fact, > do our security models even support name spaces? They don't support namespaces, and maintaining the label is critical for SELinux, at least, which mediates security for the system as a whole. -- James Morris

Re: [RFC PATCH v2 1/2] NET: Clone the sk_buff 'iif' field in __skb_clone()

2008-01-07 Thread James Morris
t;users, 1); > > atomic_inc(&(skb_shinfo(skb)->dataref)); > skb->cloned = 1; > > -- > To unsubscribe from this list: send the line "unsubscribe netdev" in > the body of a message to [EMAIL PROTECTED] > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: 2.6.24-rc6-mm1 - git-lblnet.patch and networking horkage

2007-12-31 Thread James Morris
performance reasons in any case. > 2. Copy the ->iif field in __copy_skb_header() Seems valid. - James -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[RFC PATCH v9 06/18] LSM: Add inet_sys_snd_skb() LSM hook (fwd)

2007-12-21 Thread James Morris
This is part of a large patchset which finally "fixes" labeled networking, which we're hoping to get into 2.6.25. Thread @ http://thread.gmane.org/gmane.linux.kernel.lsm/4894 The patch below is the only one which is not self-contained & impacts on core networking code. If anyone has any object

Re: [PATCH 3/3] XFRM: Drop packets when replay counter would overflow

2007-12-20 Thread James Morris
pt to transmit a packet that would result in sequence number >overflow is an auditable event. The audit log entry for this event >SHOULD include the SPI value, current date/time, Source Address, >Destination Address, and (in IPv6) the cleartext Flow ID. > > Signed-of

Re: [PATCH 2/3] XFRM: RFC4303 compliant auditing

2007-12-20 Thread James Morris
sake of consistency. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > --- > > include/net/xfrm.h | 33 -- > net/ipv4/ah4.c |4 + > net/ipv4/esp4.c|1 > net/ipv6/ah6.c

Re: [PATCH 1/3] XFRM: Assorted IPsec fixups

2007-12-20 Thread James Morris
ary memcpy() calls > > * Move common code to xfrm_audit_common_stateinfo() >Code consolidation from the "less is more" book on software development > > * Proper spacing around commas in function arguments >Minor style tweak since I was already touching the

Re: [RFC PATCH] LSM: Add inet_sys_snd_skb() LSM hook

2007-12-20 Thread James Morris
for a single packet, e.g. individual IPsec transforms, adding unwanted > overhead and complicating the security policy. I'm fine to ack this from a security pov -- any objections on the networking side? - James -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list:

Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.

2007-11-22 Thread James Morris
this datagram > will repeat recvmsg() forever, which is a worse side effect. > > So, don't give different permissions between processes who share one socket. > Otherwise, some connections/datagrams cannot be delivered to intended process. These semantics changes are concerning, and le

Re: [PATCH]: SELINUX fixup for netfilter hook changes

2007-10-15 Thread James Morris
selinux_ip_postroute_last(hooknum, skb, in, out, okfn, PF_INET6); > } > > #endif /* IPV6 */ > - > To unsubscribe from this list: send the line "unsubscribe netdev" in > the body of a message to [EMAIL PROTECTED] > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] net: fix kernel_accept() error path

2007-10-04 Thread James Morris
ock, *newsock, flags); > if (err < 0) { > sock_release(*newsock); > + *newsock = NULL; > goto done; > } > If you get an error back from kernel_accept, you should not be trying to use newsock. -- James Morris <[EMAIL PROTECTED]> - To unsubscrib

Re: [RFC] Wild and crazy ideas involving struct sk_buff

2007-08-22 Thread James Morris
y and has never gone anywhere :-) -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC] Wild and crazy ideas involving struct sk_buff

2007-08-22 Thread James Morris
hought mentioned at the first two netconfs, but it > went nowhere because the more we discussed the implementation > the more horrific it began to sound :-) Don't forget Rusty's skb reservation patches from 1999... -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this

Re: [PATCH 2/2] NET: fix memory leaks from security_secid_to_secctx()

2007-08-01 Thread James Morris
Both patches applied to: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordo

Re: [PATCH]: revised make xfrm_audit_log more generic patch

2007-07-23 Thread James Morris
igned-off-by: Joy Latten <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 1/1] Allow LSM to use IP address/port number.

2007-07-20 Thread James Morris
problem. I posted one possible solution a couple of years ago (skfilter): http://lwn.net/Articles/157137/ I think there has been some recent discussion by netfilter developers about this issue, so perhaps you could talk to them (cd'd Patrick). - James -- James Morris <[EMAIL PROTECTED]>

Re: [PATCH] make xfrm_audit_log more generic

2007-07-19 Thread James Morris
this cause existing applications to break? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: TCP stalls in current git, possibly splice related

2007-07-13 Thread James Morris
On Fri, 13 Jul 2007, Jens Axboe wrote: > On Fri, Jul 13 2007, Johannes Berg wrote: > > On Thu, 2007-07-12 at 16:12 -0400, James Morris wrote: > > > I'm seeing TCP connection stalls with current git, and a bisect found the > > > following as a possible cause: >

Re: TCP stalls in current git, possibly splice related

2007-07-12 Thread James Morris
On Thu, 12 Jul 2007, David Miller wrote: > From: James Morris <[EMAIL PROTECTED]> > Date: Thu, 12 Jul 2007 16:12:25 -0400 (EDT) > > > I'm seeing TCP connection stalls with current git, and a bisect found the > > following as a possible cause: > > To add to

TCP stalls in current git, possibly splice related

2007-07-12 Thread James Morris
clear if it's the patch itself or coincidental to it. I've looked at some tcpdumps, but may not be able to get back to them until tomorrow or the weekend, & thought it might be useful to get the report out now. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe

Re: [PATCH] IPv6: optionaly validate RAs on raw sockets

2007-07-11 Thread James Morris
rly populated initrd. > > Same goes for things like this. > > That's the fact of life these days, like it or not. Same story for NFS root when using strong authentication -- something has to be running in userland to manage that. - James -- James Morris <[EMAIL PROTECTED]> - To

Re: [RFC] Allow LSM to use IP address/port number.

2007-07-09 Thread James Morris
On Mon, 9 Jul 2007, Stephen Hemminger wrote: > Isn't it better to hook into existing netfilter infrastructure somehow? Yes, it has been suggested several times. -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in

Re: [RFC] Allow LSM to use IP address/port number.

2007-07-09 Thread James Morris
nsure that the peers are appropriately notified using the standard failure paths, not just arbitrarily propagate errors to the local user. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [E

Re: [RFC] Allow LSM to use IP address/port number. (was Re: [PATCH 1/1] Add post accept()/recvmsg() hooks.) (fwd)

2007-07-09 Thread James Morris
(original cc list has wrong netdev addr) -- Forwarded message -- Date: Mon, 9 Jul 2007 15:17:28 -0400 (EDT) From: James Morris <[EMAIL PROTECTED]> To: Tetsuo Handa <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [RFC]

Re: [SKBUFF]: Fix incorrect config #ifdef around skb_copy_secmark

2007-06-23 Thread James Morris
Thanks. Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH] Allow group ownership of TUN/TAP devices (fwd)

2007-06-18 Thread James Morris
-- Forwarded message -- Date: Mon, 18 Jun 2007 12:05:49 -0400 From: Jeff Dike <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Cc: Guido Guenther <[EMAIL PROTECTED]>, LKML <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: [PATCH] Allow group ownership of TUN/TAP devices I recieved from

Re: [2/2] 2.6.22-rc5: known regressions with patches

2007-06-17 Thread James Morris
malley <[EMAIL PROTECTED]> > James Morris <[EMAIL PROTECTED]> > Patch : http://lkml.org/lkml/2007/6/7/334 > Status : patch available This patch is queued for -mm, and will be submitted for 2.6.23. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from t

Re: [PATCH 2/2] fix several unaligned kernel accesses in the CIPSO engine

2007-06-07 Thread James Morris
with > CIPSO options attached which generate error messages on certain alignment > sensitive platforms. This patch fixes this by marking these unaligned > accesses > with the get_unaliagned() macro. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris &l

Re: [PATCH 1/2] NetLabel: consolidate the struct socket/sock handling to just struct sock

2007-06-07 Thread James Morris
code where it make sense. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-06-04 Thread James Morris
I've applied this patch to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-davem Dave, feel free to pull from that branch. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-06-04 Thread James Morris
unt for free. I also rediffed the patch against > the latest miller tree. Is the idea or patch in any way flawed or > unacceptable to people at the moment? > > Anyone willing to step up an re-ack the patch to get it moving into the > tree? Looks good to me. Acked-by: Jam

oops in net/ipv4/icmp.c:icmp_send() with icmp_errors_use_inbound_ifaddr (fwd)

2007-05-14 Thread James Morris
-- Forwarded message -- Date: Mon, 14 May 2007 08:15:50 -0700 (PDT) From: Curtis Doty <[EMAIL PROTECTED]> To: Linux Kernel <[EMAIL PROTECTED]> Subject: oops in net/ipv4/icmp.c:icmp_send() with icmp_errors_use_inbound_ifaddr Summary: On a multi-homed box, after turning on /proc/sys/

FYI: Xen or kernel bug? (fwd)

2007-04-20 Thread James Morris
Could be an upstream kernel issue lurking. -- Forwarded message -- Date: Fri, 20 Apr 2007 22:21:26 +0200 From: Mark Stier <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: FYI: Xen or kernel bug? Hello, tcp_vegas produces division by zero kernel oopses in dom0 when running a Xe

Re: [PATCH][IPSEC] fix panic when using inter address familiy IPsec on loopback

2007-04-20 Thread James Morris
e !IFF_LOOPBACK check was there in the first place. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: PATCH[1/1]: kernel panic when large security contexts in ACQUIRE

2007-04-13 Thread James Morris
On Fri, 13 Apr 2007, Joy Latten wrote: > > Signed-off-by: Joy Latten <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > > > diff -urpN linux-2.6.20/net/xfrm/xfrm_user.c > linux-2.6.20.patch/net/xfrm/xfrm_user.c > --- linux-2.6.20/net/

Re: [PATCH] Ensure local assignment bit on tun device MAC addr

2007-03-30 Thread James Morris
was made worse by Brian Braunstein's patch to keep > net_device.dev_addr and tun.dev_addr in sync. > > Signed-off-by: Rusty Russell <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > > diff -r fd8c40f4f533 drivers/net/tun.c > --- a/drivers/net/tun.c

Re: LSPP kernels (was Re: [PATCH]: SAD sometimes has double SAs).

2007-03-28 Thread James Morris
ll of the patches i'm dealing with are upstream. It seems my understanding wasn't clear on the overall workflow. If the consensus is to stay with this scheme, then please disregard my previous post. -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send t

Re: [PATCH] NET : secure sequence number functions can use nsec resolution instead of usec

2007-03-28 Thread James Morris
ecure_dccp_sequence_number() functions, we can > use the high resolution time services, providing nanosec resolution. > > I've also done two kmalloc()/kzalloc() conversions. > > Signed-off-by: Eric Dumazet <[EMAIL PROTECTED]> Looks good to me. Acked-by: James Morris <[

LSPP kernels (was Re: [PATCH]: SAD sometimes has double SAs).

2007-03-28 Thread James Morris
ainline as appropriate. Then, they can be incorporated into distro devel kernels when they update their kernels, or backported to stable distro kernels as already reviewed & tested upstream patches. If there are any objections, please respond. - James -- James Morris <[EMAIL PROTECTED]>

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-26 Thread James Morris
On Mon, 26 Mar 2007, Joy Latten wrote: > > Sending again since one of the email addresses was incorrect. > > > > Ok, I have made improvements based on James' and Eric's comments. > Acked-by: James Morris <[EMAIL PROTECTED]> > +

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-26 Thread James Morris
On Mon, 26 Mar 2007, James Morris wrote: > On Mon, 26 Mar 2007, Joy Latten wrote: > > > Signed-off-by: Joy Latten<[EMAIL PROTECTED]> > > This looks ok to me, although I have a couple of minor issues (which > should probably not stop it being merged): > &g

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-26 Thread James Morris
alue of 'err' is implicitly inverted several times in this function (and similarly in the state flush one). Something like ret = (fn() != 0); might be better. > +} > + for (i = xfrm_policy_bydst[dir].hmask; i >= 0; i--) { Tab damage? -

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-23 Thread James Morris
ogy holds up, as rm is a per-file deletion operation, and it is the shell which expands the wildcard for you. A 'flush' has a semantic implication that all entries will be removed, and it should be atomic and either succeed or fail at that granularity. - James -- James Mo

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-22 Thread James Morris
his up and test it if there are no objections. I'd suggest making the permission loop a noop if CONFIG_SECURITY=n, via a static inline function. -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message t

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-03-22 Thread James Morris
. Perhaps a better semantic would be to fail the entire flush operation if one of the security checks failed. e.g. loop through for permissions first, then if all ok, loop through for deletion. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line &qu

Re: [PATCH] NetLabel: parse the CIPSO ranged tag on incoming packets

2007-03-12 Thread James Morris
Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > --- > net/ipv4/cipso_ipv4.c |5 + > 1 file changed, 5 insertions(+) > > Index: net-2.6_bugfix_2/net/ipv4/cipso_ipv4.c > ===

Re: [PATCH] Add xfrm policy change auditing to pfkey_spdget

2007-03-08 Thread James Morris
x27;s all ready, merge into [2] (or export & apply to avoid merge commits). This is just one possible workflow. There are probably several better. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body

Re: netlink recvmsg() and MSG_TRUNC

2007-03-06 Thread James Morris
rediculous and complicated. > > Any ideas? Only slightly less complicated: user calls recvmsg() once with a new flag MSG_FLUSH, which causes the queue to be flushed, then resubmits ? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsu

Re: when having to acquire an SA, ipsec drops the packet

2007-03-06 Thread James Morris
are established... oh well, just thinking out loud... :-) I think the solution, if this actually the problem, is for the userland code to maintain the SAs. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev&qu

Re: [PATCH] fix compat_sock_common_getsockopt typo

2007-03-06 Thread James Morris
return sk->sk_prot->compat_getsockopt(sk, level, optname, > optval, optlen); > return sk->sk_prot->getsockopt(sk, level, optname, optval, optlen); Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris &l

Re: compat_sock_common_getsockopt typo?

2007-03-06 Thread James Morris
optval, optlen); > return sk->sk_prot->getsockopt(sk, level, optname, optval, optlen); > } > EXPORT_SYMBOL(compat_sock_common_getsockopt); > > Is that intentional to make protocol writers assign both if they want > compat_setsockopt? :P It's a bug

Re: when having to acquire an SA, ipsec drops the packet

2007-03-05 Thread James Morris
shed, and the larval SA keeps resending until it times out. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] xfrm audit hook misplaced in pfkey_delete and xfrm_del_sa

2007-03-05 Thread James Morris
hook to the exit path such that all failures > (and successes) will actually get audited. > > Signed-off-by: Eric Paris <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the lin

Re: [PATCH] Add xfrm policy change auditing to pfkey_spdget

2007-03-05 Thread James Morris
tch adds the auditing hooks as well. > > Signed-off-by: Eric Paris <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a messa

Re: [PATCH] xfrm_policy delete security check misplaced

2007-03-05 Thread James Morris
On Fri, 2 Mar 2007, Eric Paris wrote: > Signed-off-by: Eric Paris <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a me

RE: [PATCH] xfrm_policy delete security check misplaced

2007-03-05 Thread James Morris
On Mon, 5 Mar 2007, Venkat Yekkirala wrote: > > > > Signed-off-by: Eric Paris <[EMAIL PROTECTED]> > Acked-by: Venkat Yekkirala <[EMAIL PROTECTED]> What about your previous comment: "I guess you meant to do this here? else if (err) re

Re: [PATCH] NetLabel: Verify sensitivity level has a valid CIPSO mapping

2007-02-28 Thread James Morris
mapping verification code returns. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> [removed redhat-lspp, which is subscriber only] Acked-by: James Morris <[EMAIL PROTECTED]> > --- > net/ipv4/cipso_ipv4.c |7 --- > 1 file changed, 4 insertions(+), 3

[PATCH] net: Convert xtime.tv_sec to get_seconds()

2007-02-27 Thread James Morris
Where appropriate, convert references to xtime.tv_sec to the get_seconds() helper function. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- Please review & apply if ok. include/net/tcp.h|4 ++-- net/ipv4/route.c |2 +- net/ipv4/tcp_input.c |6 +

Re: [PATCH 09/29] selinux: tag avc cache alloc as non-critical

2007-02-21 Thread James Morris
On Wed, 21 Feb 2007, Peter Zijlstra wrote: > Failing to allocate a cache entry will only harm performance. > > Signed-off-by: Peter Zijlstra <[EMAIL PROTECTED]> > --- > security/selinux/avc.c |2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Acked-by: James

Re: ip_append_page and the socket send buffer

2007-02-16 Thread James Morris
On Fri, 16 Feb 2007, Elad Lahav wrote: > I wrote a function that is equivalent to udp_sendmsg, but uses ip_append_page > to attach data to an skb. The function is implemented as follows: Why? Where is the code? -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this li

Re: when having to acquire an SA, ipsec drops the packet

2007-02-05 Thread James Morris
On Mon, 5 Feb 2007, James Morris wrote: > On Sun, 4 Feb 2007, David Miller wrote: > > > Something like this (untested) on the ipv4 side, for example: > > Looks like it should work. Will do some testing. Appears to work well, with a slight delay on the first packet as expec

Re: when having to acquire an SA, ipsec drops the packet

2007-02-05 Thread James Morris
On Sun, 4 Feb 2007, David Miller wrote: > Something like this (untested) on the ipv4 side, for example: Looks like it should work. Will do some testing. -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of

Re: [RFC][PATCH][XFRM][1/5] extension to XFRM for dynamic endpoint update (MIGRATE)

2007-02-02 Thread James Morris
erally derivative of the kernel, but it doesn't make much sense to have only a couple of symbols exported as GPL, so probably keep it the way you already have it. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev&q

  1   2   3   4   >