Re: Out of tree module using LSM

2007-11-30 Thread James Morris
On Fri, 30 Nov 2007, Crispin Cowan wrote: The only case of this so far has been Multiadm, although there seems to be no reason for it to stay out of tree. Dazuko. It has the same yucky code issues as Talpa, but AFAIK is pure GPL2 and thus is clean on the license issues. That these

Re: Out of tree module using LSM

2007-11-30 Thread Crispin Cowan
James Morris wrote: On Fri, 30 Nov 2007, Crispin Cowan wrote: restored faces a lot of challenges, but I hope that some kind of solution can be found, because the alternative is to effectively force vendors like Sophos to do it the dirty way by fishing in memory for the syscall table. I

Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)

2007-11-30 Thread serge
Quoting KaiGai Kohei ([EMAIL PROTECTED]): Serge E. Hallyn wrote: The capability bounding set is a set beyond which capabilities cannot grow. Currently cap_bset is per-system. It can be manipulated through sysctl, but only init can add capabilities. Root can remove capabilities. By

Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.

2007-11-30 Thread Samir Bellabes
Tetsuo Handa [EMAIL PROTECTED] writes: Hello. Thank you for feedback. I have some questions. (1) Your module uses struct security_operations and is registered with register_security(). TOMOYO also uses struct security_operations and must be registered with

Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)

2007-11-30 Thread Eric W. Biederman
Serge E. Hallyn [EMAIL PROTECTED] writes: Quoting Eric W. Biederman ([EMAIL PROTECTED]): Mark Nelson [EMAIL PROTECTED] writes: Hi Paul and Eric, Do you guys have any objections to dropping the hijack_pid() and hijack_cgroup() parts of sys_hijack, leaving just hijack_ns() (see below

Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.

2007-11-30 Thread Samir Bellabes
Tetsuo Handa [EMAIL PROTECTED] writes: Hello. Thank you for detailed explanation. Samir Bellabes wrote: No, it's performed from the userspace. the goal is to don't touch the network stack at all. OK. One thing I'm worrying. Use of userspace process assumes that it shall not be killed by