Re: [PATCH net-next 1/3] security: add const qualifier to struct sock in various places

2020-12-03 Thread James Morris
gt; --- > > The code churn is unfortunate. Alternative would be to change > > the function signature of ->route_req: > > struct dst_entry *(*route_req)(struct sock *sk, ... > > [ i.e., drop 'const' ]. Thoughts? > > Security folks - is this

Re: [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks

2020-11-19 Thread James Morris
replace the flowi pointers with pointers > to the address family independent flowi_common struct. > > Reported-by: Herbert Xu > Signed-off-by: Paul Moore Acked-by: James Morris -- James Morris

Re: [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid

2020-11-09 Thread James Morris
ng back a secid. > The infrastructure passes the correct entry from the lsmblob. > > Signed-off-by: Casey Schaufler > Cc: netdev@vger.kernel.org You probably need to include Netfilter maintainers specifically for this (added them + the Netfilter list). This also needs signoffs from LSM owners. -- James Morris

Re: [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx

2020-11-09 Thread James Morris
ntainers on the To: line or they may miss the email. -- James Morris

Re: [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter

2020-11-10 Thread James Morris
(skb, ct, ctinfo, NFQA_CT, NFQA_CT_INFO) < 0) > > @@ -632,10 +627,8 @@ nfqnl_build_packet_message(struct net *net, struct > > nfqnl_instance *queue, > > } > > > > nlh->nlmsg_len = skb->len; > > - if (seclen) { > > - lsmcontext_init(&scaff, secdata, seclen, 0); > > - security_release_secctx(&scaff); > > - } > > + if (context.len) > > + security_release_secctx(&context); > > return skb; > > > > nla_put_failure: > > @@ -643,10 +636,8 @@ nfqnl_build_packet_message(struct net *net, struct > > nfqnl_instance *queue, > > kfree_skb(skb); > > net_err_ratelimited("nf_queue: error creating packet message\n"); > > nlmsg_failure: > > - if (seclen) { > > - lsmcontext_init(&scaff, secdata, seclen, 0); > > - security_release_secctx(&scaff); > > - } > > + if (context.len) > > + security_release_secctx(&context); > > return NULL; > > } > > > > -- > > 2.24.1 > > > -- James Morris

Re: [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()

2020-11-13 Thread James Morris
clist()") > Reported-by: Dan Carpenter > Signed-off-by: Paul Moore Reviewed-by: James Morris > --- > net/netlabel/netlabel_unlabeled.c |2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/netlabel/netlabel_unlabeled.c > b/ne

Re: [PATCH] vsock: use ns_capable_noaudit() on socket create

2020-10-26 Thread James Morris
it version. > > Reported-by: Roman Kiryanov > https://android-review.googlesource.com/c/device/generic/goldfish/+/1468545/ > Signed-off-by: Jeff Vander Stoep Reviewed-by: James Morris -- James Morris

Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow

2020-10-28 Thread James Morris
On Tue, 27 Oct 2020, Paul Moore wrote: > On Wed, Sep 30, 2020 at 9:44 AM Paul Moore wrote: > > On Tue, Sep 29, 2020 at 7:09 PM James Morris wrote: > > > I'm not keen on adding a parameter which nobody is using. Perhaps a note > > > in the header instead? > &g

Re: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning

2021-03-24 Thread James Morris
s. > > Add a separate NULL check to tell gcc about it as well. > > Signed-off-by: Arnd Bergmann Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git fixes-v5.12 -- James Morris

Re: [PATCH v2 0/4] Introduce LSM-hook for socketpair(2)

2018-05-04 Thread James Morris
On Fri, 4 May 2018, David Herrmann wrote: > Hi > > This is v2 of the socketpair(2) LSM hook introduction. Thanks, all applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-general -- James Morris

Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)

2018-04-25 Thread James Morris
ck backend and maybe the hook name change, I'll merge this unless DaveM wants it to go in via his networking tree. -- James Morris

Re: [PATCH 0/3] Introduce LSM-hook for socketpair(2)

2018-04-25 Thread James Morris
On Wed, 25 Apr 2018, Paul Moore wrote: > On Wed, Apr 25, 2018 at 2:44 PM, James Morris wrote: > > On Mon, 23 Apr 2018, David Herrmann wrote: > >> This patch series tries to close this gap and makes both behave the > >> same. A new LSM-hook is added which allow

Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode

2019-06-27 Thread James Morris
another security > module to take over lockdown decisions once it has initialized (including > policy load), and to be able to access state that is currently private to the > lockdown module, like the level. Why not utilize stacking (restrictively), similarly to capabilities? -- James Morris

Re: [kernel-hardening] [PATCH net-next v7 00/10] Landlock LSM: Toward unprivileged sandboxing

2017-08-27 Thread James Morris
is > missing is a way to enforce a security policy for any application by its > developer and *unprivileged user* as seccomp can do for raw syscall filtering. > You could mention here that the first case is Mandatory Access Control, in general terms. -- James Morris

Re: [PATCH net-next v7 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier

2017-08-27 Thread James Morris
On Tue, 22 Aug 2017, Alexei Starovoitov wrote: > more general question: what is the status of security/ bits? > I'm assuming they still need to be reviewed and explicitly acked by James, > right? Yep, along with other core security developers where possible. -- James Morris

Re: [kernel-hardening] Re: [PATCH net-next v7 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier

2017-08-27 Thread James Morris
th an ABI version, the user can > easily check if the current kernel support that. Don't call it an ABI, perhaps minimum policy version (similar to what SELinux does). Changes need to be made so that any existing userspace still works. -- James Morris

Re: [PATCH net-next v7 04/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()

2017-08-27 Thread James Morris
abstract FS struct */ > }; Looks like a spurious empty line. -- James Morris

Re: [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall

2017-10-11 Thread James Morris
On Wed, 4 Oct 2017, Chenbo Feng wrote: > int bpf_map_new_fd(struct bpf_map *map, int flags) > { > + if (security_bpf_map(map, OPEN_FMODE(flags))) > + return -EPERM; > + Don't hardcode -EPERM here, return the actual error from security_bpf_map(). > + if (security_bpf_prog(p

Re: [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter

2020-07-27 Thread James Morris
ger.kernel.org I'd like to see Paul's acks on any networking related changes. -- James Morris

Re: [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow

2020-09-29 Thread James Morris
es the problem of > the LSM hook callers sending the wrong secid which would be much > worse. > > Reported-by: Herbert Xu > Signed-off-by: Paul Moore I'm not keen on adding a parameter which nobody is using. Perhaps a note in the header instead? -- James Morris

Re: [PATCH v5 next 0/5] Improve Module autoloading infrastructure

2017-11-27 Thread James Morris
!capable(CAP_NET_ADMIN) || !unprivileged_autoload(module_name))) return -EPERM; -- James Morris

Re: [PATCH v5 next 0/5] Improve Module autoloading infrastructure

2017-11-27 Thread James Morris
itelist to /proc (per-task) or /sys/fs (global) ? The per-task whitelist is inherited from the global one by default, or from a parent process if it's been modified in the parent. -- James Morris

[BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
net: sk_buff rbnode reorg ... Anyone else able to reproduce this, or have any ideas on what's happening? - James -- James Morris

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
skb)->header.h4, IPCB(skb), > > sizeof(struct inet_skb_parm)); > > Please try this fix for IPv4 (a similar patch will be needed for IPv6) > > net/ipv4/tcp_ipv4.c | 51 ++ > 1 file changed, 32 insertions(+), 19 deletions(-) Works for me, no crashes with the testsuite running in a loop. Tested-by: James Morris -- James Morris

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-29 Thread James Morris
On Wed, 29 Nov 2017, Casey Schaufler wrote: > I see that there is a proposed fix later in the thread, but I don't see > the patch. Could you send it to me, so I can try it on my problem? Forwarded off-list. Interestingly, I didn't see the KASAN output email from Stephen here. -- James Morris

Re: [BUG] kernel stack corruption during/after Netlabel error

2017-11-30 Thread James Morris
On Thu, 30 Nov 2017, Eric Dumazet wrote: > On Wed, 2017-11-29 at 19:16 -0800, Casey Schaufler wrote: > > On 11/29/2017 4:31 PM, James Morris wrote: > > > On Wed, 29 Nov 2017, Casey Schaufler wrote: > > > > > > > I see that there is a proposed fix later

Re: [PATCH] security: fix the default value of secid_to_secctx hook

2020-05-14 Thread James Morris
> Thank you Arnd for helping me figure out what went wrong. > > CC: Arnd Bergmann > Fixes: 98e828a0650f ("security: Refactor declaration of LSM hooks") > Signed-off-by: Anders Roxell Note, this patch should have been sent to me and cc'd the LSM list. Acked-by: James Morris -- James Morris

Re: [PATCH] security: fix the default value of secid_to_secctx hook

2020-05-14 Thread James Morris
x/lsm_hook_defs.h > > @@ -243,7 +243,7 @@ LSM_HOOK(int, -EINVAL, getprocattr, struct task_struct > > *p, char *name, > > char **value) > > LSM_HOOK(int, -EINVAL, setprocattr, const char *name, void *value, size_t > > size) > > LSM_HOOK(int, 0, ismaclabel, const char *name) > > -LSM_HOOK(int, 0, secid_to_secctx, u32 secid, char **secdata, > > +LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata, > > u32 *seclen) > > LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 > > *secid) > > LSM_HOOK(void, LSM_RET_VOID, release_secctx, char *secdata, u32 seclen) > > -- > > 2.20.1 > > > -- James Morris

Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information

2017-08-10 Thread James Morris
On Thu, 10 Aug 2017, Paul Moore wrote: > From: Paul Moore > > Signed-off-by: Paul Moore Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next -- James Morris

Re: [PATCH] MAINTAINERS: update the NetLabel and Labeled Networking information

2017-08-10 Thread James Morris
; > +F: include/net/netlabel.h > > +F: include/uapi/linux/netfilter/xt_SECMARK.h > > +F: include/uapi/linux/netfilter/xt_CONNSECMARK.h > > +F: net/netlabel/ > > +F: net/ipv4/cipso_ipv4.c > > +F: net/ipv6/calipso.c > > +F: net/netfilter/xt_CONNSECMARK.c > > +F: net/netfilter/xt_SECMARK.c > > > > NETWORKING [TLS] > > M: Ilya Lesokhin > > -- James Morris

Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control

2017-10-18 Thread James Morris
On Wed, 18 Oct 2017, David Miller wrote: > Series applied. I hadn't gotten to reviewing this patchset yet. Please wait for more acks/reviews from LSM folk for things touching security/, next time. -- James Morris

Re: [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall

2017-10-19 Thread James Morris
ual security module can decide which command need to be checked and > how the cmd should be checked. > > Signed-off-by: Chenbo Feng Acked-by: James Morris -- James Morris

Re: [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations

2017-10-19 Thread James Morris
ject, > selinux will check if processes have the right privileges. The creation > of eBPF object are also checked at the general bpf check hook and new > cmd introduced to eBPF domain can also be checked there. > > Signed-off-by: Chenbo Feng > Acked-by: Alexei Starovoitov Revi

Re: [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive

2017-10-19 Thread James Morris
configured. > > Signed-off-by: Chenbo Feng > Acked-by: Stephen Smalley Reviewed-by: James Morris -- James Morris

Re: [RFC PATCH 1/5] security: Add support for SCTP security hooks

2017-10-19 Thread James Morris
not an expert on SCTP. It would be good to see more review from networking folk. Reviewed-by: James Morris -- James Morris

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-06-04 Thread James Morris
unt for free. I also rediffed the patch against > the latest miller tree. Is the idea or patch in any way flawed or > unacceptable to people at the moment? > > Anyone willing to step up an re-ack the patch to get it moving into the > tree? Looks good to me. Acked-by: Jam

Re: [PATCH]: Add security check before flushing SAD/SPD

2007-06-04 Thread James Morris
I've applied this patch to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-davem Dave, feel free to pull from that branch. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the

Re: [PATCH 1/2] NetLabel: consolidate the struct socket/sock handling to just struct sock

2007-06-07 Thread James Morris
code where it make sense. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 2/2] fix several unaligned kernel accesses in the CIPSO engine

2007-06-07 Thread James Morris
with > CIPSO options attached which generate error messages on certain alignment > sensitive platforms. This patch fixes this by marking these unaligned > accesses > with the get_unaliagned() macro. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris &l

Re: [2/2] 2.6.22-rc5: known regressions with patches

2007-06-17 Thread James Morris
malley <[EMAIL PROTECTED]> > James Morris <[EMAIL PROTECTED]> > Patch : http://lkml.org/lkml/2007/6/7/334 > Status : patch available This patch is queued for -mm, and will be submitted for 2.6.23. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from t

[PATCH] Allow group ownership of TUN/TAP devices (fwd)

2007-06-18 Thread James Morris
-- Forwarded message -- Date: Mon, 18 Jun 2007 12:05:49 -0400 From: Jeff Dike <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Cc: Guido Guenther <[EMAIL PROTECTED]>, LKML <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: [PATCH] Allow group ownership of TUN/TAP devices I recieved from

Re: [SKBUFF]: Fix incorrect config #ifdef around skb_copy_secmark

2007-06-23 Thread James Morris
Thanks. Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC] Allow LSM to use IP address/port number. (was Re: [PATCH 1/1] Add post accept()/recvmsg() hooks.) (fwd)

2007-07-09 Thread James Morris
(original cc list has wrong netdev addr) -- Forwarded message -- Date: Mon, 9 Jul 2007 15:17:28 -0400 (EDT) From: James Morris <[EMAIL PROTECTED]> To: Tetsuo Handa <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [RFC]

Re: [RFC] Allow LSM to use IP address/port number.

2007-07-09 Thread James Morris
nsure that the peers are appropriately notified using the standard failure paths, not just arbitrarily propagate errors to the local user. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [E

Re: [RFC] Allow LSM to use IP address/port number.

2007-07-09 Thread James Morris
On Mon, 9 Jul 2007, Stephen Hemminger wrote: > Isn't it better to hook into existing netfilter infrastructure somehow? Yes, it has been suggested several times. -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in

Re: [PATCH] IPv6: optionaly validate RAs on raw sockets

2007-07-11 Thread James Morris
rly populated initrd. > > Same goes for things like this. > > That's the fact of life these days, like it or not. Same story for NFS root when using strong authentication -- something has to be running in userland to manage that. - James -- James Morris <[EMAIL PROTECTED]> - To

TCP stalls in current git, possibly splice related

2007-07-12 Thread James Morris
clear if it's the patch itself or coincidental to it. I've looked at some tcpdumps, but may not be able to get back to them until tomorrow or the weekend, & thought it might be useful to get the report out now. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe

Re: TCP stalls in current git, possibly splice related

2007-07-12 Thread James Morris
On Thu, 12 Jul 2007, David Miller wrote: > From: James Morris <[EMAIL PROTECTED]> > Date: Thu, 12 Jul 2007 16:12:25 -0400 (EDT) > > > I'm seeing TCP connection stalls with current git, and a bisect found the > > following as a possible cause: > > To add to

Re: TCP stalls in current git, possibly splice related

2007-07-13 Thread James Morris
On Fri, 13 Jul 2007, Jens Axboe wrote: > On Fri, Jul 13 2007, Johannes Berg wrote: > > On Thu, 2007-07-12 at 16:12 -0400, James Morris wrote: > > > I'm seeing TCP connection stalls with current git, and a bisect found the > > > following as a possible cause: >

Re: [PATCH 2/7] NetLabel: core network changes

2006-07-14 Thread James Morris
16 msg_flags, > + const u32 msg_pid, > + const u32 msg_seq) Why are these parameters marked const? Seems to be common throughout the code. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe net

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-14 Thread James Morris
sock->sk field is not > +defined yet but it is not a problem as the only users of these > +"lite" PF_INET sockets are functions which do an accept() call > +afterwards so we will label the socket as part of the accept(). */ Coding style standard for multi

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-14 Thread James Morris
On Fri, 14 Jul 2006, [EMAIL PROTECTED] wrote: > +/** > + * cipso_v4_bitmap_walk - Walk a bitmap looking for a bit > + * cipso_v4_bitmap_setbit - Sets a single bit in a bitmap Can you use lib/bitmap.c instead? -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-14 Thread James Morris
of these global variables and using temporary pointers? Why not just simply free each entry? The way this is coded makes it seem like you're unsure about the safety of the code. e.g. what could it possibly matter at this stage whether cipso_v4_cache is NULL or not? I think I asked t

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-15 Thread James Morris
2(&buf, iter->doi, &buf_len); > + netlbl_putinc_u32(&buf, iter->type, &buf_len); > + } > + rcu_read_unlock(); > + > + return skb; > +} > + -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-15 Thread James Morris
On Sat, 15 Jul 2006, James Morris wrote: > > + /* XXX - In both cases, this is kinda ugly as we have to go through > > + the list once to determine how large of a buffer we need, > > + drop the locks, allocate the buffer, grab the locks, and > > + final

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-15 Thread James Morris
pin_lock(). You need to perform the search a second time under the spin_lock() as a slow path to verify that an entry wasn't added, before adding a new one. - James James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 3/7] NetLabel: CIPSOv4 engine

2006-07-15 Thread James Morris
d mapping? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] ip multicast route bug fix

2006-07-24 Thread James Morris
or double free. > > Signed-off-by: Stephen Hemminger <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTE

[PATCH][IPv4/IPv6] Setting 0 for unused port field. (fwd)

2006-07-25 Thread James Morris
-- Forwarded message -- Date: Tue, 25 Jul 2006 16:38:05 +0900 From: [EMAIL PROTECTED] To: linux-kernel@vger.kernel.org Subject: [PATCH][IPv4/IPv6] Setting 0 for unused port field. Hello. The recvmsg() for raw socket seems to return random u16 value from the kernel stack memory si

Re: [PATCH 3/5] [NET]: Protocol Independant Policy Routing Rules Framework

2006-07-26 Thread James Morris
On Thu, 27 Jul 2006, Thomas Graf wrote: > + rule = kmalloc(ops->rule_size, GFP_KERNEL); > + if (rule == NULL) { > + err = -ENOMEM; > + goto errout; > + } > + memset(rule, 0, ops->rule_size); > + kzalloc() ? :-) - James -- Jam

Re: [PATCH 10/10] MLSXFRM-v02: Auto-labeling of child sockets

2006-07-27 Thread James Morris
arameter sid to SECSID_NULL in > selinux_xfrm_decode_session() > and handles this value in the caller selinux_inet_conn_request() > appropriately. > > Signed-off-by: Venkat Yekkirala <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > --- NOTE: Not

[PATCH][SECURITY] secmark: nul-terminate secdata

2006-07-28 Thread James Morris
a similar fix (e.g. xt_string looks suspect at first glance). cc'd Chris Wright, as this patch seems like a candidate for the stable tree. Signed-off-by: James Morris <[EMAIL PROTECTED]> Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]> --- diff -purN -X dontdiff linux-

Re: [-mm patch] security/selinux/hooks.c: make 4 functions static

2006-07-29 Thread James Morris
l functions static. > > Signed-off-by: Adrian Bunk <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] fix memory leak in net/ipv4/tcp_probe.c::tcpprobe_read()

2006-07-30 Thread James Morris
Patch below fixes that. > > > > > > Signed-off-by: Jesper Juhl <[EMAIL PROTECTED]> > Agreed, thanks for catching it. The whole kfifo interface is kind of > annoying have to do an extra copy. Might be cleaner to make a single return path for cleanup: Signed-off-b

Re: [PATCH 3/23] [PATCH] [XFRM]: Add Kconfig to enable advanced transformation.

2006-07-30 Thread James Morris
vanced functions (EXPERIMENTAL)" > + depends on XFRM && EXPERIMENTAL > + ---help--- > + Support advanced transformation for developers. > + > + If unsure, say N. > + > config NET_KEY > tristate "PF_KEY sockets" > select XFRM >

Re: [PATCH 1/20] [PATCH] [IPV6]: Add Kconfig to enable Mobile IPv6.

2006-07-30 Thread James Morris
The overall kernel config is getting very messed up because of all of these selects. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 7/23] [PATCH] [XFRM] STATE: Add a hook to find where to be inserted header in outbound.

2006-07-30 Thread James Morris
gopt(skb, &prevhdr); } Maybe also change the naming of ->place_find to ->hdr_offset - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 8/23] [PATCH] [XFRM] STATE: Add a hook to obtain local/remote outbound address.

2006-07-30 Thread James Morris
>props.saddr; Again, it'd make the code so much cleaner to provide static inline wrappers for all of these types of: foo = op ? op->() : bar; and if (op) bar = op->(); -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send t

Re: [take2 1/4] kevent: core files.

2006-08-01 Thread James Morris
On Tue, 1 Aug 2006, Evgeniy Polyakov wrote: > + u->ready_num = 0; > +#ifdef CONFIG_KEVENT_USER_STAT > + u->wait_num = u->im_num = u->total = 0; > +#endif Generally, #ifdefs in the body of the kernel code are discouraged. Can you abstract these out as static inli

Re: [take2 1/4] kevent: core files.

2006-08-01 Thread James Morris
On Tue, 1 Aug 2006, Evgeniy Polyakov wrote: > On Tue, Aug 01, 2006 at 09:46:58AM -0400, James Morris ([EMAIL PROTECTED]) > wrote: > > On Tue, 1 Aug 2006, Evgeniy Polyakov wrote: > > > > > + u->ready_num = 0; > > > +#ifdef CONFIG_KEVENT_USER_STAT > &g

Re: [RFC 2/3] secid reconciliation on inbound: add LSM hooks

2006-08-01 Thread James Morris
c->sid, skb, &ad); */ > +out: return err; > } Did you mean to leave the call to selinux_xfrm_sock_rcv_skb() commented out? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a

Re: [RFC 1/3] secid reconciliation on inbound

2006-08-01 Thread James Morris
On Tue, 1 Aug 2006, Venkat Yekkirala wrote: > +#define PACKET__COME_THRU 0x0008UL > +#define PACKET__GO_THRU 0x0010UL These names seem awkward, and do we really need a separate perm for each direction? - James -- James Morris &

Re: [RFC 1/3] secid reconciliation on inbound

2006-08-01 Thread James Morris
On Tue, 1 Aug 2006, James Morris wrote: > On Tue, 1 Aug 2006, Venkat Yekkirala wrote: > > > +#define PACKET__COME_THRU 0x0008UL > > +#define PACKET__GO_THRU 0x0010UL > > These names seem awkward, and do we really

Re: [PATCH 20/23] [PATCH] [XFRM] POLICY: sub policy support.

2006-08-02 Thread James Morris
rent approach is needed, where the disposition of a policy can be to re-submit a packet for another policy match after the current bundle has been traversed (something like NF_REPEAT). - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubs

[Patch] fix potential stack overflow in net/core/utils.c (fwd)

2006-08-03 Thread James Morris
-- Forwarded message -- Date: Thu, 3 Aug 2006 18:35:45 -0700 From: "Siddha, Suresh B" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED], linux-kernel@vger.kernel.org Subject: [Patch] fix potential stack overflow in net/core/utils.c On High end systems (1024 or so cpus

Re: [SELinux]: selinux_socket_getpeersec_dgram() compile fix

2006-08-05 Thread James Morris
On Sat, 5 Aug 2006, Thomas Graf wrote: > Collision between "[NetLabel]: SELinux support" and > "[AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec" > > Signed-off-by: Thomas Graf <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTE

Re: [PATCH] eth: indentation and cleanup

2006-08-15 Thread James Morris
On Tue, 15 Aug 2006, Stephen Hemminger wrote: > -__be16 eth_type_trans(struct sk_buff *skb, struct net_device *dev) > +__be16 eth_type_trans(struct sk_buff * skb, struct net_device * dev) Looks fine except for this. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe fr

Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.

2007-11-22 Thread James Morris
this datagram > will repeat recvmsg() forever, which is a worse side effect. > > So, don't give different permissions between processes who share one socket. > Otherwise, some connections/datagrams cannot be delivered to intended process. These semantics changes are concerning, and le

Re: [PATCH] net: fix kernel_accept() error path

2007-10-04 Thread James Morris
ock, *newsock, flags); > if (err < 0) { > sock_release(*newsock); > + *newsock = NULL; > goto done; > } > If you get an error back from kernel_accept, you should not be trying to use newsock. -- James Morris <[EMAIL PROTECTED]> - To unsubscrib

Re: PATCH[1/1]: kernel panic when large security contexts in ACQUIRE

2007-04-13 Thread James Morris
On Fri, 13 Apr 2007, Joy Latten wrote: > > Signed-off-by: Joy Latten <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > > > diff -urpN linux-2.6.20/net/xfrm/xfrm_user.c > linux-2.6.20.patch/net/xfrm/xfrm_user.c > --- linux-2.6.20/net/

Re: [PATCH][IPSEC] fix panic when using inter address familiy IPsec on loopback

2007-04-20 Thread James Morris
e !IFF_LOOPBACK check was there in the first place. - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

FYI: Xen or kernel bug? (fwd)

2007-04-20 Thread James Morris
Could be an upstream kernel issue lurking. -- Forwarded message -- Date: Fri, 20 Apr 2007 22:21:26 +0200 From: Mark Stier <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: FYI: Xen or kernel bug? Hello, tcp_vegas produces division by zero kernel oopses in dom0 when running a Xe

oops in net/ipv4/icmp.c:icmp_send() with icmp_errors_use_inbound_ifaddr (fwd)

2007-05-14 Thread James Morris
-- Forwarded message -- Date: Mon, 14 May 2007 08:15:50 -0700 (PDT) From: Curtis Doty <[EMAIL PROTECTED]> To: Linux Kernel <[EMAIL PROTECTED]> Subject: oops in net/ipv4/icmp.c:icmp_send() with icmp_errors_use_inbound_ifaddr Summary: On a multi-homed box, after turning on /proc/sys/

Re: [PATCH] make xfrm_audit_log more generic

2007-07-19 Thread James Morris
this cause existing applications to break? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 1/1] Allow LSM to use IP address/port number.

2007-07-20 Thread James Morris
problem. I posted one possible solution a couple of years ago (skfilter): http://lwn.net/Articles/157137/ I think there has been some recent discussion by netfilter developers about this issue, so perhaps you could talk to them (cd'd Patrick). - James -- James Morris <[EMAIL PROTECTED]>

Re: [PATCH]: revised make xfrm_audit_log more generic patch

2007-07-23 Thread James Morris
igned-off-by: Joy Latten <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 2/2] NET: fix memory leaks from security_secid_to_secctx()

2007-08-01 Thread James Morris
Both patches applied to: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordo

Re: [RFC] Wild and crazy ideas involving struct sk_buff

2007-08-22 Thread James Morris
hought mentioned at the first two netconfs, but it > went nowhere because the more we discussed the implementation > the more horrific it began to sound :-) Don't forget Rusty's skb reservation patches from 1999... -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this

Re: [RFC] Wild and crazy ideas involving struct sk_buff

2007-08-22 Thread James Morris
y and has never gone anywhere :-) -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH]: SELINUX fixup for netfilter hook changes

2007-10-15 Thread James Morris
selinux_ip_postroute_last(hooknum, skb, in, out, okfn, PF_INET6); > } > > #endif /* IPV6 */ > - > To unsubscribe from this list: send the line "unsubscribe netdev" in > the body of a message to [EMAIL PROTECTED] > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC PATCH] LSM: Add inet_sys_snd_skb() LSM hook

2007-12-20 Thread James Morris
for a single packet, e.g. individual IPsec transforms, adding unwanted > overhead and complicating the security policy. I'm fine to ack this from a security pov -- any objections on the networking side? - James -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list:

Re: [PATCH 1/3] XFRM: Assorted IPsec fixups

2007-12-20 Thread James Morris
ary memcpy() calls > > * Move common code to xfrm_audit_common_stateinfo() >Code consolidation from the "less is more" book on software development > > * Proper spacing around commas in function arguments >Minor style tweak since I was already touching the

Re: [PATCH 2/3] XFRM: RFC4303 compliant auditing

2007-12-20 Thread James Morris
sake of consistency. > > Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> > --- > > include/net/xfrm.h | 33 -- > net/ipv4/ah4.c |4 + > net/ipv4/esp4.c|1 > net/ipv6/ah6.c

Re: [PATCH 3/3] XFRM: Drop packets when replay counter would overflow

2007-12-20 Thread James Morris
pt to transmit a packet that would result in sequence number >overflow is an auditable event. The audit log entry for this event >SHOULD include the SPI value, current date/time, Source Address, >Destination Address, and (in IPv6) the cleartext Flow ID. > > Signed-of

[RFC PATCH v9 06/18] LSM: Add inet_sys_snd_skb() LSM hook (fwd)

2007-12-21 Thread James Morris
This is part of a large patchset which finally "fixes" labeled networking, which we're hoping to get into 2.6.25. Thread @ http://thread.gmane.org/gmane.linux.kernel.lsm/4894 The patch below is the only one which is not self-contained & impacts on core networking code. If anyone has any object

Re: 2.6.24-rc6-mm1 - git-lblnet.patch and networking horkage

2007-12-31 Thread James Morris
performance reasons in any case. > 2. Copy the ->iif field in __copy_skb_header() Seems valid. - James -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC PATCH v2 1/2] NET: Clone the sk_buff 'iif' field in __skb_clone()

2008-01-07 Thread James Morris
t;users, 1); > > atomic_inc(&(skb_shinfo(skb)->dataref)); > skb->cloned = 1; > > -- > To unsubscribe from this list: send the line "unsubscribe netdev" in > the body of a message to [EMAIL PROTECTED] > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- James Morris <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 0/2] Quiet noisy LSM denial when accessing net sysctl

2016-06-02 Thread James Morris
t; Hello - Just checking in again to see if you plan on taking these > through the security tree? Sure, please resend. -- James Morris

[PATCH] SELinux: Add support for DCCP

2006-11-13 Thread James Morris
rg/pub/scm/linux/kernel/git/jmorris/selinux-net-2.6.20.git Acked-by: Stephen Smalley <[EMAIL PROTECTED]> Signed-off-by: James Morris <[EMAIL PROTECTED]> --- security/selinux/hooks.c | 66 +++--- security/selinux/include/av_inherit.h|

Re: Network virtualization/isolation

2006-11-14 Thread James Morris
about other network subsystems: xfrm, netfilter, iptables, netlink, etc. ? - James -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

  1   2   3   4   >