Ah! Good catch, thank you! CONFIG based stacking for Yama will be
removed 4.3, but this is appropriate for fixing in 4.2.
Thank you very much for your time!
Salvatore Mesoraca
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord
to securityfs_remove so that the caller
knows if it succeeded or not.
Signed-off-by: Salvatore Mesoraca s.mesorac...@gmail.com
---
include/linux/security.h | 4 ++--
security/inode.c | 14 +-
2 files changed, 11 insertions(+), 7 deletions(-)
diff --git a/include/linux/security.h b/include
Without this patch YAMA will not work at all if it is chosen
as the primary LSM instead of being stacked.
Signed-off-by: Salvatore Mesoraca s.mesorac...@gmail.com
---
security/yama/yama_lsm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c
It looks like your mailer is converting tabs to spaces, please fix and
resend.
I'm sorry for this. I'm resending a fixed V2.
Salvatore Mesoraca
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info
Without this patch YAMA will not work at all if it is chosen
as the primary LSM instead of being stacked.
Signed-off-by: Salvatore Mesoraca s.mesorac...@gmail.com
---
V1-V2:
Tabs issue fixed.
---
security/yama/yama_lsm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/security/yama
Without this patch YAMA will not work at all if it is chosen
as the primary LSM instead of being stacked.
Signed-off-by: Salvatore Mesoraca s.mesorac...@gmail.com
---
V1-V2:
Tabs issue fixed.
---
security/yama/yama_lsm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/security/yama
2017-07-11 1:40 GMT+02:00 Mickaël Salaün <m...@digikod.net>:
>
> On 10/07/2017 09:59, Salvatore Mesoraca wrote:
>> 2017-07-09 21:35 GMT+02:00 Mickaël Salaün <m...@digikod.net>:
>>> Hi,
>>>
>>> I think it make sense to merge the W^X feature
2017-07-09 21:35 GMT+02:00 Mickaël Salaün :
> Hi,
>
> I think it make sense to merge the W^X features with the TPE/shebang LSM
> [1].
>
> Regards,
> Mickaël
>
> [1]
> https://lkml.kernel.org/r/d9aca46b-97c6-4faf-b559-484feb4aa...@digikod.net
Hi,
Can you elaborate why it would
2017-06-28 1:13 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Thu, Jun 15, 2017 at 9:42 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Some programs need to generate part of their code at runtime. Luckily
>> enough, in some cases they only gene
2017-06-28 1:07 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Thu, Jun 15, 2017 at 9:42 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Creation of a new hook to let LSM modules handle user-space pagefaults on
>> x86.
>> It can be used to avoid
2017-06-28 1:04 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Thu, Jun 15, 2017 at 9:42 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> +static int sara_check_vmflags(vm_flags_t vm_flags)
>> +{
>> + u16 sara_wx
2017-06-28 1:05 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Thu, Jun 15, 2017 at 9:42 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Creation of a new LSM hook to check if a given configuration of vmflags,
>> for a new memory allocation request, sho
2017-06-28 0:51 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Mon, Jun 12, 2017 at 9:56 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Adding documentation for S.A.R.A. LSM.
>>
>> Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.co
-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/lsm_hooks.h | 5 +
security/Kconfig | 1 +
security/Makefile | 2 +
security/sara/Kconfig | 42 +++
security/sara/Makefile | 3 +
security/sara/include/
rampolines.
This feature is implemented only on x86_32 and x86_64.
The assembly sequences used here were originally obtained from PaX source
code.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 17
security/sara/include/tra
mit message" of the following emails.
[1] https://github.com/smeso/saractl
[2] https://github.com/smeso/sara-test
Salvatore Mesoraca (11):
S.A.R.A. Documentation
S.A.R.A. framework creation
Creation of "usb_device_auth" LSM hook
S.A.R.A. USB Filtering
Creation of "
Creation of a new hook to let LSM modules handle user-space pagefaults on
x86.
It can be used to avoid segfaulting the originating process.
If it's the case it can modify process registers before returning.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
Cc: x...@kernel.org
Cc
Creation of a new LSM hook to check if a given configuration of vmflags,
for a new memory allocation request, should be allowed or not.
It's placed in "do_mmap", "do_brk_flags" and "__install_special_mapping".
Signed-off-by: Salvatore Mesoraca <s.mesorac...@
Adding documentation for S.A.R.A. LSM.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
Documentation/admin-guide/kernel-parameters.txt | 40 +
Documentation/security/00-INDEX | 2 +
Documentation/security/SARA.rst
gher level of granularity
than the current authorization interface.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
Cc: linux-...@vger.kernel.org
Cc: Greg Kroah-Hartman <gre...@linuxfoundation.org>
---
drivers/usb/core/hub.c| 4
drivers/usb/core/sysfs.c | 6 +-
include
both as a white list or as a
black list.
The original idea is inspired by the Grsecurity "Deny USB" feature.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 41
security/sara/Makefile| 1 +
security/sara/include
here: https://github.com/smeso/saralib
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/wxprot.c | 123 +
1 file changed, 123 insertions(+)
diff --git a/security/sara/wxprot.c b/security/sara/wxprot.c
index 44e42be..0
RELRO section will be marked read only.
Parts of WX Protection are inspired by some of the features available in
PaX.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 75 +
security/sara/Makefile | 1 +
security/sara/include/wx
This allow S.A.R.A. to use the procattr interface without interfering
with other LSMs.
This part should be reimplemented as soon as upstream procattr stacking
support is available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
fs/proc/base.c
stream, so this part will
be modified as soon as the LSM stackable cred blob management will be
available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/cred.h | 3 ++
security/sara/Makefile| 2 +-
security/sara/include/sara_data.h | 47 +++
2017-06-20 9:07 GMT+02:00 Pavel Machek :
> Hmm. Given that USB device provides vendor id/product id, this does
> not really stop anyone, right?
>
> AFAICT you can still get USB stick with vid/pid of logitech keyboard,
> and kernel will recognize it as a usb stick.
There are a number
2017-06-12 23:31 GMT+02:00 Casey Schaufler :
> Have the hook return a value and return that rather
> than -EPERM. That way a security module can choose an
> error that it determines is appropriate. It is possible
> that a module might want to deny the access for a reason
>
2017-06-13 8:34 GMT+02:00 Christoph Hellwig :
> Please always post the whole series including the users, thanks.
I'm sorry for the inconvenience, it won't happen again.
Thank you for your comment.
2017-06-15 18:47 GMT+02:00 :
> Thanks for doing this porting work. Look forward to using GRSecurity/PAX
> features on ARM eventually. ARM's taking over as we know. x86 is almost
> done.
Do you have any suggestion about potential use of trampoline emulation on ARM?
Adding documentation for S.A.R.A. LSM.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
Documentation/admin-guide/kernel-parameters.txt | 23
Documentation/security/00-INDEX | 2 +
Documentation/security/SARA.rst
one via procattr
interface only apply to current thread. (suggested by Jann Horn)
[1] https://github.com/smeso/saractl
[2] https://github.com/smeso/sara-test
Salvatore Mesoraca (9):
S.A.R.A. Documentation
S.A.R.A. framework creation
Creation of "check_vmflags" LSM hook
This allow S.A.R.A. to use the procattr interface without interfering
with other LSMs.
This part should be reimplemented as soon as upstream procattr stacking
support is available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
fs/proc/base.c
-in.
This feature can be use to run the JIT compiler with few restrictions while
enforcing full WX Protection in the rest of the program.
To simplify access to this interface a CC0 licensed library is available
here: https://github.com/smeso/libsara
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.
stream, so this part will
be modified as soon as the LSM stackable cred blob management will be
available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/cred.h | 3 ++
security/sara/Makefile| 2 +-
security/sara/include/sara_data.h | 47 +++
rampolines.
This feature is implemented only on x86_32 and x86_64.
The assembly sequences used here were originally obtained from PaX source
code.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 17
security/sara/include/tra
RELRO section will be marked read only.
Parts of WX Protection are inspired by some of the features available in
PaX.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 75 +
security/sara/Makefile | 1 +
security/sara/include/wx
-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/lsm_hooks.h | 5 +
security/Kconfig | 1 +
security/Makefile | 2 +
security/sara/Kconfig | 42 +++
security/sara/Makefile | 3 +
security/sara/include/
oesn't introduce new exploit vectors.
- It's a feature that can be turned on only if needed, on a per
executable file basis.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
arch/x86/mm/fault.c | 6 ++
include/linux/lsm_hooks.h | 9 +
include/linux/security.h
Creation of a new LSM hook to check if a given configuration of vmflags,
for a new memory allocation request, should be allowed or not.
It's placed in "do_mmap", "do_brk_flags" and "__install_special_mapping".
Signed-off-by: Salvatore Mesoraca <s.mesorac
2017-06-12 19:32 GMT+02:00 Thomas Gleixner :
> That explains, what you could do with it, but it completely lacks any
> rationale WHY this is desired and good behaviour and how that is a security
> feature.
You are right, I could have been more descriptive.
This is not a
2017-06-12 19:49 GMT+02:00 Jann Horn <ja...@google.com>:
> On Mon, Jun 12, 2017 at 6:56 PM, Salvatore Mesoraca
> As far as I can tell, the wxprot interface in procfs, when used as
> /proc/PID/attr/sara/wxprot, actually only sets restrictions on one of the
> threads.
> The
2017-06-12 19:35 GMT+02:00 Krzysztof Opasiak :
> Could you please explain me why we need LSM for this?
>
> There are tools like usbguard[1] and as far as I can tell it looks like they
> can do everything for you...
I have to admit that this is the first time I read about
2017-06-12 21:38 GMT+02:00 Greg Kroah-Hartman :
> No, like Krzysztof said, you can already do this today, just fine, from
> userspace. I think that support has been there for over a decade now,
> why are you not taking advantage of this already?
> No need to add extra
2017-06-12 23:31 GMT+02:00 Casey Schaufler :
> Return the error reported by the hook rather than -EPERM.
Agreed, anyway this part will be, probably, dropped in
the next version (read Greg and Krzysztof answers).
I'm sorry :(
Thank you very much for the time you spent on
on and off separately for FIFOs and regular
files via sysctl, just like the symlinks/hardlinks protection.
This patch is based on Openwall's "HARDEN_FIFO" feature by Solar
Designer .
Suggested-by: Solar Designer <so...@openwall.com>
Suggested-by: Kees Cook <keesc...@chromium.org>
Si
2017-09-18 20:07 GMT+02:00 Jordan Glover :
> Hi,
Hi!
> I tested this S.A.R.A LSM and it works well. It's nice replacement for PaX
> mprotect feature from grsecurity patschset. It doesn't need much learning
> curve as SElinux. I hope it will be accepted in mainline.
2017-09-19 2:37 GMT+02:00 Solar Designer <so...@openwall.com>:
> On Mon, Sep 18, 2017 at 02:00:50PM -0700, Kees Cook wrote:
>> On Fri, Sep 15, 2017 at 1:43 AM, Salvatore Mesoraca <s.mesorac...@gmail.com>
>> wrote:
>> > The purpose is to make data spoofing a
2017-09-18 23:00 GMT+02:00 Kees Cook <keesc...@chromium.org>:
> On Fri, Sep 15, 2017 at 1:43 AM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Disallows writing into FIFOs or regular files not owned by the user
>> in world writable sticky directories
RELRO section will be marked read only.
Parts of WX Protection are inspired by some of the features available in
PaX according to my understanding of the code. Changes or omissions from
the original code are mine and don't reflect the original grsecurity/PaX
code.
Signed-off-by: Salvatore Me
Adding documentation for S.A.R.A. LSM.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
Documentation/admin-guide/LSM/SARA.rst | 170
Documentation/admin-guide/LSM/index.rst | 1 +
Documentation/admin-guide/kernel-parameters.txt
y/PaX code.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
security/sara/Kconfig | 18
security/sara/include/trampolines.h | 173
security/sara/wxprot.c | 140 +
3 files changed
so, for the moment, I
didn't move it.
[1] https://github.com/smeso/saractl
[2] https://github.com/smeso/sara-test
Salvatore Mesoraca (9):
S.A.R.A. Documentation
S.A.R.A. framework creation
Creation of "check_vmflags" LSM hook
S.A.R.A. cred blob management
S.A.R.
Creation of a new LSM hook to check if a given configuration of vmflags,
for a new memory allocation request, should be allowed or not.
It's placed in "do_mmap", "do_brk_flags" and "__install_special_mapping".
Signed-off-by: Salvatore Mesoraca <s.mesorac
-in.
This feature can be use to run the JIT compiler with few restrictions while
enforcing full WX Protection in the rest of the program.
To simplify access to this interface a CC0 licensed library is available
here: https://github.com/smeso/libsara
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.
This allow S.A.R.A. to use the procattr interface without interfering
with other LSMs.
This part should be reimplemented as soon as upstream procattr stacking
support is available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
fs/proc/base.c
-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/lsm_hooks.h | 5 +
security/Kconfig | 1 +
security/Makefile | 2 +
security/sara/Kconfig | 43 +++
security/sara/Makefile | 3 +
security/sara/include/
new exploit vectors.
- It's a feature that can be turned on only if needed, on a per
executable file basis.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
arch/Kconfig | 6 ++
arch/x86/Kconfig | 1 +
arch/x86/mm/fault.c | 6 ++
incl
stream, so this part will
be modified as soon as the LSM stackable cred blob management will be
available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/cred.h | 3 ++
security/sara/Makefile| 2 +-
security/sara/include/sara_data.h | 47 +++
2017-09-26 16:40 GMT+02:00 Jann Horn <ja...@google.com>:
> On Tue, Sep 26, 2017 at 4:14 PM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Disallows O_CREAT open missing the O_EXCL flag, in world or
>> group writable directories, even if the file doesn't exi
particular attack vector.
In fact, before symlinks restrictions, fifos/regular files were not the
favorite vehicle to exploit them.
Suggested-by: Solar Designer <so...@openwall.com>
Suggested-by: Kees Cook <keesc...@chromium.org>
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmai
.
This feature allows to detect and potentially block programs that
act this way and can be used to find vulnerabilities (like those
prevented by patch #1) and to do policy enforcement.
Suggested-by: Solar Designer <so...@openwall.com>
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
in respective commit messages.
Salvatore Mesoraca (2):
Protected FIFOs and regular files
Protected O_CREAT open in sticky directory
Documentation/sysctl/fs.txt | 66 +
fs/namei.c | 118 ++--
include/linux/fs.h
I've noticed that some of the latest upstream commits broke S.A.R.A.
And now it doesn't compile.
The fix is trivial (just some reordering in a function arguments' list) so
I prefer to not flood the lists with a v4 with just for 2 lines change.
For review and comments the code posted here is still
2017-11-24 12:53 GMT+01:00 David Laight <david.lai...@aculab.com>:
> From: Salvatore Mesoraca [mailto:s.mesorac...@gmail.com]
>> Sent: 24 November 2017 11:44
>>
>> 2017-11-24 11:53 GMT+01:00 David Laight <david.lai...@aculab.com>:
>> > From: A
2017-11-23 23:57 GMT+01:00 Tobin C. Harding <m...@tobin.cc>:
> On Wed, Nov 22, 2017 at 09:01:46AM +0100, Salvatore Mesoraca wrote:
>
> Same caveat about this being English language comments only as for patch
> 1/2. Please ignore if this is too trivial. My grammar is a long
2017-11-24 11:53 GMT+01:00 David Laight <david.lai...@aculab.com>:
> From: Alan Cox
>> Sent: 22 November 2017 16:52
>>
>> On Wed, 22 Nov 2017 09:01:46 +0100
>> Salvatore Mesoraca <s.mesorac...@gmail.com> wrote:
>>
>> > Disallows O_CREAT open mi
2017-11-22 17:51 GMT+01:00 Alan Cox <gno...@lxorguk.ukuu.org.uk>:
> On Wed, 22 Nov 2017 09:01:46 +0100
> Salvatore Mesoraca <s.mesorac...@gmail.com> wrote:
>
>> Disallows O_CREAT open missing the O_EXCL flag, in world or
>> group writable directories, e
2017-11-23 23:43 GMT+01:00 Tobin C. Harding <m...@tobin.cc>:
> On Wed, Nov 22, 2017 at 09:01:45AM +0100, Salvatore Mesoraca wrote:
>
> Please take these comments in all humility, my English is a long way
> from perfect. These are English grammar comments only. If this is viewed
&
2017-11-22 14:22 GMT+01:00 Matthew Wilcox <wi...@infradead.org>:
> On Wed, Nov 22, 2017 at 09:01:46AM +0100, Salvatore Mesoraca wrote:
>> +An O_CREAT open missing the O_EXCL flag in a sticky directory is,
>> +often, a bug or a synthom of the fact that the program is not
, it probably has a bug.
This feature allows to detect and potentially block programs that
act this way, it can be used to find vulnerabilities (like those
prevented by patch #1) and to do policy enforcement.
Suggested-by: Solar Designer <so...@openwall.com>
Signed-off-by: Salvatore Mesoraca <
more easily.
Salvatore Mesoraca (2):
Protected FIFOs and regular files
Protected O_CREAT open in sticky directories
Documentation/sysctl/fs.txt | 66 +
fs/namei.c | 117 ++--
include/linux/fs.h | 3
particular attack vector.
In fact, before symlinks restrictions, fifos/regular files were not the
favorite vehicle to exploit them.
Suggested-by: Solar Designer <so...@openwall.com>
Suggested-by: Kees Cook <keesc...@chromium.org>
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmai
2017-11-27 1:26 GMT+01:00 Solar Designer <so...@openwall.com>:
> On Fri, Nov 24, 2017 at 12:43:47PM +0100, Salvatore Mesoraca wrote:
> > 2017-11-24 11:53 GMT+01:00 David Laight <david.lai...@aculab.com>:
> > > From: Alan Cox
> > >> Sent: 22 November 2017
2017-11-30 17:30 GMT+01:00 Solar Designer <so...@openwall.com>:
> Replying to Salvatore and Ian at once, and CC'ing H. Peter Anvin and
> Karel Zak for util-linux flock(1).
>
> On Thu, Nov 30, 2017 at 02:57:06PM +, Ian Campbell wrote:
> > On Thu, 2017-11-30 at 15:39 +
RELRO section will be marked read only.
Parts of WX Protection are inspired by some of the features available in
PaX according to my understanding of the code. Changes or omissions from
the original code are mine and don't reflect the original grsecurity/PaX
code.
Signed-off-by: Salvatore Me
-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/lsm_hooks.h | 5 +
security/Kconfig | 1 +
security/Makefile | 2 +
security/sara/Kconfig | 40 +++
security/sara/Makefile | 3 +
security/sara/include/
y/PaX code.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
arch/x86/Kbuild| 2 +
arch/x86/security/Makefile | 2 +
arch/x86/security/sara/Makefile| 1 +
arch/x86/security/sara/emutramp.c | 55
arch/x
stream, so this part will
be modified as soon as the LSM stackable cred blob management will be
available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/linux/cred.h | 3 ++
security/sara/Makefile| 2 +-
security/sar
ook is also used to determine what to do
with an RWE PT_GNU_STACK header. This allows LSM to force the loader
to silently ignore executable stack markings, which is useful a thing to
do when trampoline emulation is available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com&g
This allow S.A.R.A. to use the procattr interface without interfering
with other LSMs.
This part should be reimplemented as soon as upstream procattr stacking
support is available.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
fs/proc/base.c
Adding documentation for S.A.R.A. LSM.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
Documentation/admin-guide/LSM/SARA.rst | 173
Documentation/admin-guide/LSM/index.rst | 1 +
Documentation/admin-guide/kernel-parameters.txt
new exploit vectors.
- It's a feature that can be turned on only if needed, on a per
executable file basis.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
arch/Kconfig | 6 ++
arch/x86/Kconfig | 1 +
arch/x86/mm/fault.c | 6 ++
incl
-in.
This feature can be use to run the JIT compiler with few restrictions while
enforcing full WX Protection in the rest of the program.
To simplify access to this interface a CC0 licensed library is available
here: https://github.com/smeso/libsara
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.
Adds support for extended filesystem attributes in security and user
namespaces. They can be used to override flags set via the centralized
configuration, even when S.A.R.A. configuration is locked or saractl
is not used at all.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.
th mentionig here.
[1] https://github.com/smeso/saractl
[2] https://github.com/smeso/sara-test
Salvatore Mesoraca (10):
S.A.R.A. Documentation
S.A.R.A. framework creation
Creation of "check_vmflags" LSM hook
S.A.R.A. cred blob management
S.A.R.A. WX Protection
Creation of "pa
2017-12-07 22:47 GMT+01:00 Solar Designer <so...@openwall.com>:
> On Tue, Dec 05, 2017 at 11:21:00AM +0100, Salvatore Mesoraca wrote:
> > 2017-11-30 17:30 GMT+01:00 Solar Designer <so...@openwall.com>:
> > > $ strace flock /tmp/lockfile -c cat
> > > [..
2018-03-13 21:06 GMT+01:00 Florian Fainelli <f.faine...@gmail.com>:
> On 03/13/2018 12:58 PM, Vivien Didelot wrote:
>> Hi Salvatore,
>>
>> Salvatore Mesoraca <s.mesorac...@gmail.com> writes:
>>
>>> dsa_switch's num_ports is currently fixed to D
-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
include/net/dsa.h | 3 +++
net/dsa/dsa2.c| 14 ++
net/dsa/switch.c | 22 ++
3 files changed, 27 insertions(+), 12 deletions(-)
diff --git a/include/net/dsa.h b/include/net/dsa.h
index 60fb4ec..576791d
2018-05-07 21:26 GMT+02:00 Andrew Lunn :
>> >> +++ b/include/net/dsa.h
>> >> @@ -256,6 +256,9 @@ struct dsa_switch {
>> >> /* Number of switch port queues */
>> >> unsigned intnum_tx_queues;
>> >>
>> >> + unsigned long *bitmap;
>> >> +
2018-05-08 11:39 GMT+02:00 David Laight <david.lai...@aculab.com>:
> From: Salvatore Mesoraca
>> Sent: 07 May 2018 20:03
> ...
>> This optimization will save us an allocation when number of ports is
>> less than 32 or 64 (depending on arch).
>> IMHO it's use
2018-05-07 20:14 GMT+02:00 Florian Fainelli <f.faine...@gmail.com>:
> On 05/07/2018 08:23 AM, Salvatore Mesoraca wrote:
>> We avoid 2 VLAs by using a pre-allocated field in dsa_switch.
>> We also try to avoid dynamic allocation whenever possible.
>>
>> Link:
>&
2018-06-04 18:57 GMT+02:00 Steve Kemp :
>> A configurable LSM is probably the right way to do this.
>
> I wonder how many out of tree LSM there are? Looking at the mainline
> kernel the only "small" LSM bundled is YAMA, and it seems that most of
> the patches proposing new ones eventually die
2018-05-26 17:48 GMT+02:00 Alexey Dobriyan <adobri...@gmail.com>:
> On Sat, May 26, 2018 at 04:50:46PM +0200, Salvatore Mesoraca wrote:
>> Prevent a task from opening, in "write" mode, any /proc/*/mem
>> file that operates on the task's mm.
>> /p
A process can use it to overwrite read-only memory, making
pointless the use of security_file_mprotect() or other ways to
enforce RO memory.
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
fs/proc/base.c | 25 ++---
fs/proc/internal.h | 3 ++-
fs
2018-05-27 3:33 GMT+02:00 Linus Torvalds :
> On Sat, May 26, 2018 at 5:32 PM Kees Cook wrote:
>
>> I went through some old threads from 2012 when e268337dfe26 was
>> introduced, and later when things got looked at during DirtyCOW. There
>> was
2018-05-28 11:06 GMT+02:00 Jann Horn <ja...@google.com>:
> On Sat, May 26, 2018 at 4:50 PM, Salvatore Mesoraca
> <s.mesorac...@gmail.com> wrote:
>> Prevent a task from opening, in "write" mode, any /proc/*/mem
>> file that operates on the task's mm.
&g
2018-04-20 18:51 GMT+02:00 Herbert Xu <herb...@gondor.apana.org.au>:
> On Mon, Apr 09, 2018 at 03:54:45PM +0200, Salvatore Mesoraca wrote:
>> v2:
>> As suggested by Herbert Xu, the blocksize and alignmask checks
>> have been moved to crypto_check_alg.
>
.
[1] https://lkml.org/lkml/2018/3/7/621
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
net/llc/llc_sap.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c
index d90928f..a7f7b8f 100644
--- a/net/llc/llc_sap.c
+++
n_ready will always be less than or equal to MAX_MAILBOXES.
So we avoid a VLA[1] and use fixed-length arrays instead.
[1] https://lkml.org/lkml/2018/3/7/621
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
drivers/scsi/eata.c | 2 +-
1 file changed, 1 insertion(+), 1 de
Avoid VLA[1] by using an already allocated buffer passed
by the caller.
[1] https://lkml.org/lkml/2018/3/7/621
Signed-off-by: Salvatore Mesoraca <s.mesorac...@gmail.com>
---
net/rds/connection.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/net/rds/connection.c
1 - 100 of 342 matches
Mail list logo