On Wed, 26 Dec 2007, Andrew Morton wrote:
> > (under current -mm, the e1000 driver doesn't find my ethernet card & the
> > tcl tests won't run without an external interface).
>
> You might need to enable CONFIG_E1000E.
Indeed, it works for me.
- James
--
count);
+ if (rc)
+ return rc;
+
+ *ppos += count;
Use simple_read_from_buffer().
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More m
intf() and grab the return
value.
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
&cap_entry_fops);
> + if (!f_caps[i])
Ditto.
Another issue is that securityfs depends on CONFIG_SECURITY, which might
be undesirable, given that capabilities are a standard feature.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
it/jmorris/selinux-2.6.git#for-akpm
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
performance reasons in any case.
> 2. Copy the ->iif field in __copy_skb_header()
Seems valid.
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordom
ilesystem is the best candidate?
> I prefer procfs or sysfs instead.
Sysfs makes more sense, as this information is system-wide and does not
relate to specific processes.
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel&
tainability etc.
That would be at least a useful first step in taking this issue seriously.
Thanks,
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
y have been accepted.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
been posted
by Arjan (and acked by myself) for the case of valid out of tree users.
The only case of this so far has been Multiadm, although there seems to be
no reason for it to stay out of tree.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the l
articipation in the upstream process, rather than have upstream maintain
stable kernel APIs which are naturally mismatched to the unknown
requirements of out of tree users.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe l
p_min_addr low memory protection. Add security checks
> > in do_brk().
> >
> > Signed-off-by: Eric Paris <[EMAIL PROTECTED]>
>
> ACK
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm
--
James Morris
<[EMAIL PROTECTED]>
--
To uns
th
> skb_recv_datagram()/socket_post_accept()?
>
> If nobody has objection, I'd like to cut these
> skb_recv_datagram()/socket_post_accept() changes
> and submit to -mm tree.
You should send anything which touches core networking to netdev, too, and
get an ack from one of th
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http:/
On Wed, 21 Nov 2007, Stephen Smalley wrote:
> Do not clear f_op when removing entries since it isn't safe to do.
>
> Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]>
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm
--
James Morr
vm86 emulation can work even with mmap_min_addr set.
>
> Signed-off-by: Eric Paris <[EMAIL PROTECTED]>
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm
If nobody hollers, I'll push it to Linus when the next merge window opens.
- James
retval = wait_task_zombie(p,
> (options & WNOWAIT), infop,
> stat_addr, ru);
> } else if (p->exit_state != EXIT_DEAD) {
> -check_continued:
>
he mmap_sem in read mode. We need the
>* anon_vma lock to serialize against concurrent expand_stacks.
>*/
> - address &= PAGE_MASK;
> - error = 0;
>
> /* Somebody else might have raced and expanded it already */
> if (address < vma->vm_start) {
>
.c b/mm/nommu.c
> index 35622c5..b989cb9 100644
> --- a/mm/nommu.c
> +++ b/mm/nommu.c
> @@ -829,6 +829,9 @@ unsigned long do_mmap_pgoff(struct file *file,
> void *result;
> int ret;
>
> + if (!(flags & MAP_FIXED))
> + addr = round_hint_to_min(addr);
>
On Sat, 12 Jan 2008, Tetsuo Handa wrote:
> Hello.
>
> James Morris wrote:
> > > > TOMOYO Linux uses /sys/kernel/security/tomoyo interface for
> > > > configuration.
> > >
> > > Why aren't you using securityfs for this? (It was designe
Please review.
Tested with SELinux in enforcing mode.
---
All instances of rw_verify_area() are followed by a call to
security_file_permission(), so just call the latter from the former.
Signed-off-by: James Morris <[EMAIL PROTECTED]>
---
fs/compat.c |4 ---
fs/read_write.c
supports unknown
permission classes. Any recent distro policy should have this.
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vg
kfree(secdata);
> @@ -4937,6 +4942,7 @@ static struct security_operations selinux_ops = {
> .setprocattr = selinux_setprocattr,
>
> .secid_to_secctx = selinux_secid_to_secctx,
> + .secctx_to_secid = selinux_secctx_to_secid,
>
will need to go in after Paul Moore's labeled networking update (hopefully
very soon after the next merge window opens).
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMA
On Wed, 16 Jan 2008, Paul Moore wrote:
> On Tuesday 15 January 2008 8:05:27 pm James Morris wrote:
> > On Tue, 15 Jan 2008, David Howells wrote:
> > > secid_to_secctx() LSM hook. This patch also includes the SELinux
> > > implementation for this hook.
> >
t;depend" on security.h not being
included all over the place, as LSM does touch a lot of the kernel.
Unecessarily including it is bad, of course.
I'm not sure I understand your namespace pollution issue, either.
In any case, I think the right solution is not to include security.h at
all in
t; #include
> > #include
> > #include
>
> Fine by me.
I'll queue it for -mm & 2.6.25.
- James
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
anually.
>
> Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
Acked-by: James Morris <[EMAIL PROTECTED]>
(Candidate for stable ?)
- James
--
James Morris <[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a mess
int *flags, int num_opts)
> {
> int rc = 0, i;
> struct task_security_struct *tsec = current->security;
>
--
James Morris
<[EMAIL PROTECTED]>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PRO
ies functionality.
> > If you are unsure how to answer this question, answer Y.
> > ---
> >
> > Does this seem incongruous? Also, what's the "question"? :)
> >
> > Thanks,
> > Matt LaPlante
>
> Anyone?
I think this should be default y.
On Sat, 19 Mar 2005 [EMAIL PROTECTED] wrote:
> kj-domen/security/selinux/ss/policydb.c | 35
> ++--
> 1 files changed, 20 insertions(+), 15 deletions(-)
Have you tested these changes?
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe
from the calculations in
> scatterwalk_start). Are these two conclusions correct, James?
Yes, passing in an offset beyond the page size is wrong.
Also, I don't know why PAGE_CACHE_SIZE is being used here instead of
PAGE_SIZE. Even though they're always the same now, I would sug
scatterlist *sg)
{
...
rest_of_page = PAGE_CACHE_SIZE - (sg->offset & (PAGE_CACHE_SIZE - 1));
walk->len_this_page = min(sg->length, rest_of_page);
}
rest_of_page should be just PAGE_SIZE - sg->offset (sg->offset should
never extend beyond the page).
And then how wou
x17d/0x409 [esp4]
[] xfrm4_rcv_encap+0x102/0x512
[] ip_local_deliver+0x9d/0x28c
[] ip_rcv+0x251/0x508
[] netif_receive_skb+0x1f6/0x223
[] process_backlog+0x7c/0x10f
[] net_rx_action+0x79/0xfb
[] __do_softirq+0x62/0xcc
[] do_softirq+0x57/0x5b
- James
--
James Morris
<[EMAIL PROTECTED
to something concrete in the existing kernel which would benefit
from passing an arbitrary number of scatterlists in, just code for the
case of processing two at once (input & output).
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "
works beyond the test vectors.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
oes not ever
need to be kmapped.
What you really need to do is use an array for the tweak (or possibly a
structure which maintains state about it if needed).
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel"
about my camelcase style in gfmulseq.c? My file isn't
> even intended to be included by other files, unlike this include file.
I don't know why the code is like that, but it is not an excuse to put
more like it into the kernel.
- James
--
James Morris
<[EMAIL PROTECTED]>
linearly generated data fed into this process. It does not
need to be kmapped. It is not discontiguous. There is no need for a
third or Nth scatterlist.
Making a generic N-way scatterlist processor is pointless overengineering,
causing new problems with non-trivial solutions, for no bene
ressed in that area since
then.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
On Fri, 28 Jan 2005, Jasper Spaans wrote:
> Is this supposed to happen?
No. What is your kernel version?
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
On Fri, 28 Jan 2005, Jasper Spaans wrote:
> On Thu, Jan 27, 2005 at 07:38:43PM -0500, James Morris wrote:
> > > Is this supposed to happen?
> >
> > No. What is your kernel version?
>
> Current bitkeeper + latest swsusp2 patches and hostap driver, however, those
On Fri, 28 Jan 2005, Nigel Cunningham wrote:
> You normally test cryptoapi functionality while booting?
This happens if you link tcrypt statically into the kernel.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-
.edu/~daw/papers/tweak-crypto02.pdf
(Pointers to any critique of the system would be appreciated).
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo
case, LRW should be made configurable and marked experimental.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
ed here, given that this is not a
fast path. I guess it doesn't do any harm.
> + for(csg = walk_infos, cbuf = dispatch_list; csg->sw.sg; csg++,
> cbuf++) {
> + if(csg->ioflag == 1)
for ()
if ()
> + for(csg = walk_infos;
not needed for
generic scatterwalk).
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read
hint for the compiler to do better jump
> prediction and speculations. Remove?
Correct, although I think this will get lost in the noise given that it's
sitting in the middle of crypto processing. I'd remove it.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe
On Wed, 2 Feb 2005, James Morris wrote:
> Correct, although I think this will get lost in the noise given that it's
> sitting in the middle of crypto processing. I'd remove it.
Dave just ok'd it, so take his advice over mine :-)
- james
--
James Morris
<[EMAIL PROTEC
ES_586 or a new CRYPTO_AES_GENERIC option
> depending on the platform.
Good thinking, didn't think to chain selects.
> BTW: Does CRYPTO_AES_586 work on an 386 or 486?
>From memory it is generic i386 asm optimize for P5.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubs
he 'booleans' directory under the selinuxfs
root.
See http://www.tresys.com/Downloads/selinux-tools/README-COND.txt
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL P
On Tue, 1 Mar 2005, Alexander Nyberg wrote:
> The 'bad' label will call function that unconditionally dereferences
> the NULL pointer.
>
> Found by the Coverity tool
>
> Signed-off-by: Alexander Nyberg <[EMAIL PROTECTED]>
Signed-off-by: James Morris <
On Tue, 1 Mar 2005, Alexander Nyberg wrote:
> There's a leak here in the first error path.
>
> Found by the Coverity tool.
>
> Signed-off-by: Alexander Nyberg <[EMAIL PROTECTED]>
Signed-off-by: James Morris <[EMAIL PROTECTED]>
--
James Morris
<[EMAIL PROTE
fully stepped up to help.
Hopefully things will now move forward more quickly in this area.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More ma
not as a collection of miscellaneous features.
In the case of this code, I would suggest integrating it into the core
kernel, and providing an LSM hook to allow other LSMs to mediate it.
As an example, see the vm_enough_memory hook.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To
cket is a TCP packet; i have tried with ICMP and
>UDP packets
> also but this does not trigger any oops. I have tried to code on several computers
>and they
> all oops. The following description regards the case when submitting new packets
>instead
> of TCP packets.
Please try t
updated policy to deal with it?
You need an updated policy, which you can grab from rawhide for FC3 or via
CVS at http://selinux.sourceforge.net/
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body
amework) to consider, if
permission to dual license from the original authors can be obtained.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at ht
This patch adds Netlink message types related to the TC action code,
allowing finer grained SELinux control of this.
Please apply.
Author: jamal <[EMAIL PROTECTED]>
Signed-off-by: James Morris <[EMAIL PROTECTED]>
Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]>
---
e generic scatterwalker solves the
null encryption performance problem that was reported a little while back.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More major
debugged and analyzed framework.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Ple
n
example of why it's a bad idea to add infrastructure which isn't being
used at the time.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordom
I'll review this in detail over the next day or so (still catching up on
some backlog after vacation).
Just wondering how much testing the generic scatterwalk code has had (I
gather disk encryption has been tested, but what about ipsec?).
- James
--
James Morris
<[EMAIL PROTECTED]&
any cycles to work on implementing your ideas for
more cleanly reworking Michal's multiblock code?
Also, I would think this is more 2.6.12 material, at this stage.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-ke
ge. If we can get permission to use
OCF, then we need to work out what's best.
> And how - when there is more than one interface - are these projects
> going to reuse code?
I would imagine so.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the
On Fri, 16 Nov 2007, Eric Paris wrote:
> On Sat, 2007-11-17 at 08:42 +1100, James Morris wrote:
> > On Fri, 16 Nov 2007, Eric Paris wrote:
> >
> > > +#ifdef CONFIG_SECURITY
> > > + /*
> > > + * If a hint addr is less than mmap_min_addr change addr to
t; mmap_min_addr))
> + addr = PAGE_ALIGN(mmap_min_addr);
> +#endif
> +
> /* decide whether we should attempt the mapping, and if so what sort of
>* mapping */
> ret = validate_mmap_request(file, addr, len, prot, flags, pgoff,
>
>
--
James Morris
at
it is not done with !CONFIG_SECURITY ?
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Ple
On Fri, 16 Nov 2007, Eric Paris wrote:
> On Sat, 2007-11-17 at 08:47 +1100, James Morris wrote:
> > On Fri, 16 Nov 2007, Eric Paris wrote:
> >
> > > On a kernel with CONFIG_SECURITY but without an LSM which implements
> > > security_file_mmap it is impossible for
ts
> security is a win. (and remember, in kernel we still default this to
> off so noone is going to 'accidentally' see and security checks in the
> dummy hooks)
If it's off by default and generally useful across LSMs, why not just put
it in the base kernel code?
- James
--
On Thu, 25 Oct 2007, [EMAIL PROTECTED] wrote:
> Convert the selinux sysctl pathname computation code into a standalone
> function.
>
> Signed-off-by: Andreas Gruenbacher <[EMAIL PROTECTED]>
> Signed-off-by: John Johansen <[EMAIL PROTECTED]>
Reviewed-by: Jam
security/selinux/xfrm.c | 13 +++--
> 1 files changed, 7 insertions(+), 6 deletions(-)
>
> This version suppresses the warning without ugly ifdefs.
Thanks, Stephen.
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-linus
--
James Morris
&l
urrent->euid != tsk->uid)
> + && (current->euid != tsk->suid)) {
> + put_task_struct(tsk);
> + return -EACCES;
I wonder if we should allow CAP_SYS_ADMIN to do this, too.
--
James Morris
<[EMAIL PROT
tested.
Thanks!
Verified and applied to:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-linus
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMA
if (err)
remove_privs();
with
void remove_privs()
{
mutex_lock();
__remove_privs();
mutex_unlock();
}
and then __remove_privs() handles the logic for all file privileges,
including at this stage suid and the LSM call for file caps ?
- James
--
James
On Tue, 7 Aug 2007, Serge E. Hallyn wrote:
> Shall I resend without the LSM_NEED_LOCK, or do you still want a more
> fundamental change?
Removing the needlock is enough, the rest was just a query/suggestion.
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: s
On Tue, 7 Aug 2007, Serge E. Hallyn wrote:
> Yeah, I did that in v1, but didn't want to add two new security_ hooks.
> But I'll send a v4 doing that.
Yep, add what's actually needed.
Continually having to jump through all of these hoops for LSM has gone
beyond ridiculous.
igned-off-by: Al Viro <[EMAIL PROTECTED]>
Acked-by: James Morris <[EMAIL PROTECTED]>
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
On Wed, 8 Aug 2007, Serge E. Hallyn wrote:
> Here is the next version. This one involved a bit more actual
> switching of logic so was a bit more nerve-wracking, but it
> seems to be working correctly now.
Looks good to me.
Acked-by: James Morris <[EMAIL PROTECTED]>
-
On Thu, 9 Aug 2007, David Howells wrote:
> + u32 (*inode_get_secid)(struct inode *inode);
To maintain API consistency, please return an int which only acts as an
error code, and returning the secid via a *u32 function parameter.
- James
--
James Morris
<[EMAIL PROTECTED]
On Thu, 9 Aug 2007, David Howells wrote:
> James Morris <[EMAIL PROTECTED]> wrote:
>
> > > + u32 (*inode_get_secid)(struct inode *inode);
> >
> > To maintain API consistency, please return an int which only acts as an
> > error code, and returning
ld you instead simply pass the inode
pointer around?
(I know it's not always possible, but much preferred).
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More
On Thu, 9 Aug 2007, David Howells wrote:
> James Morris <[EMAIL PROTECTED]> wrote:
>
> > David, I've looked at the code and can't see that you need to access the
> > label itself outside the LSM. Could you instead simply pass the inode
> > pointer aro
required exit code
> - remove a bunch of no longer used exports
>
> Signed-off-by: Adrian Bunk <[EMAIL PROTECTED]>
Acked-by: James Morris <[EMAIL PROTECTED]>
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel&q
OTECTED] (subscribers-only)
> W: http://www.nsa.gov/selinux
> S: Supported
> +F: include/linux/selinux*
> +F: security/selinux/
Why are you changing descriptions of the maiking lists ?
Nack.
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: sen
yOn Mon, 13 Aug 2007, Joe Perches wrote:
> On Mon, 2007-08-13 at 05:13 -0700, James Morris wrote:
> > On Sun, 12 Aug 2007, [EMAIL PROTECTED] wrote:
> > > -L: linux-kernel@vger.kernel.org (kernel issues)
> > > -L: [EMAIL PROTECTED] (subscribers-only, g
x27;s a debug aid at best.
It clarifies to all developers that the syscall table should not be messed
with.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More ma
where we need
> to pass the mm and the existing one is modified to pass current->mm to
> avoid the need to change large amounts of code.
>
> (Thanks to Tobias for fixing rejects and testing)
>
> Signed-off-by: Alan Cox <[EMAIL PROTECTED]>
> Cc: WU Fengguang <[EMAIL
development practices, to not maintain unused infrastructure.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
r upstream inclusion, which
would be better at least in terms of upstream maintenance, as your code
will be visible in the tree.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message
you also need to reinstate
capability_exit and general modular bits for security/capability.c.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
; LSMs can perform their own configuration of the NetLabel subsystem without
> > relying on assistance from userspace.
> >
> > Signed-off-by: Paul Moore <[EMAIL PROTECTED]>
>
> You sent it, so this patch needs a Signed-off-by:you, please.
Also add
Reviewed-by: J
On Wed, 24 Jan 2007, Sunil Naidu wrote:
> If Kernel community comes down to India...this would have a big impact
> on the community + industry too.
I think it's a good idea.
> Any other reasons am missing here?
Cost of flying 70 mainly US/European developers to India.
- J
On Wed, 21 Feb 2007, Peter Zijlstra wrote:
> Failing to allocate a cache entry will only harm performance.
>
> Signed-off-by: Peter Zijlstra <[EMAIL PROTECTED]>
> ---
> security/selinux/avc.c |2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Acked-by: James
enforced at
> build-time?
This is being disabled in the guest kernel only. The host and guest
kernels are expected to be the same build.
- James
--
James Morris
<[EMAIL PROTECTED]>
order from that via get_order(), as it should be 4 instead of 16;
and this code is now both implying PAGE_SIZE while also using it for
calculations.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of
!hype_pages)
+ return -ENOMEM;
This will try and allocate 2^16 pages. I guess we need a
HYPERVISOR_PAGE_ORDER ?
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
M
On Sat, 10 Feb 2007, Andi Kleen wrote:
> - lguest
> * still seems heavily in development. Not sure it will be ready in time.
How would you define ready?
It's currently useful and stable, and features a lack of enterprise-class
complexity.
- James
--
James Morris
<[EMAIL PR
On Mon, 12 Feb 2007, Andi Kleen wrote:
> > It's currently useful and stable,
>
> How do you know?
I've been working on it for some weeks. At this stage, it's also useful
for some simple kernel hacking.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To uns
FWIW,
I've set up an unofficial git tree with these patches, and will try and
track changes as they're posted.
git://git.infradead.org/~jmorris/lguest-testing.git
Use the 'current' branch.
- James
--
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe fro
201 - 300 of 1222 matches
Mail list logo