[PATCH] Char: tpm: fixed white spaces and braces coding style issues

2015-01-17 Thread Bruno E O Meneguele
Fixed some coding style issues. Signed-off-by: Bruno E O Meneguele bmenegu...@gmail.com --- drivers/char/tpm/tpm.h | 10 +- drivers/char/tpm/tpm_i2c_stm_st33.c | 10 ++ 2 files changed, 11 insertions(+), 9 deletions(-) diff --git a/drivers/char/tpm/tpm.h b/drivers

[PATCH] sched: fix typo on topology error message

2017-08-11 Thread Bruno E. O. Meneguele
Trivial typo correction on kernel/sched/topology.c pr_err() message. Signed-off-by: Bruno E. O. Meneguele <bmenegu...@gmail.com> --- kernel/sched/topology.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/sched/topology.c b/kernel/sched/topology.c index bd8b6d

[PATCH] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele <bmenegu...@gmail.com> --- security/integrity/ima/ima_main.c | 6 +++

Re: [PATCH] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
On 04-12, Bruno E. O. Meneguele wrote: > Simple but useful message log to the user in case of module appraise is > forced and fails due to the lack of file descriptor, that might be > caused by kmod calls to compressed modules. > > Signed-off-by: Bruno E. O. Meneguele <bm

[PATCH v2] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele <brdeo...@redhat.com> --- security/integrity/ima/ima_main.c | 6 +++

Re: [PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
On 04-12, Joe Perches wrote: > On Mon, 2017-12-04 at 18:23 -0200, Bruno E. O. Meneguele wrote: > > Simple but useful message log to the user in case of module appraise is > > forced and fails due to the lack of file descriptor, that might be > > caused by kmod calls

[PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele <brdeo...@redhat.com> --- security/integrity/ima/ima_main.c | 6 +++

[PATCH v3] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
From: "Bruno E. O. Meneguele" <bmenegu...@gmail.com> Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele <

Re: [PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
Ignore this erroneously sent email. v2 was already superseded by v3. On 05-12, Bruno E. O. Meneguele wrote: > Simple but useful message log to the user in case of module appraise is > forced and fails due to the lack of file descriptor, that might be > caused by kmod calls to compresse

Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-25 Thread Bruno E. O. Meneguele
On 24-10, Mimi Zohar wrote: > On Tue, 2017-10-24 at 15:37 -0200, Bruno E. O. Meneguele wrote: > > When the user requests MODULE_CHECK policy and its kernel is compiled > > with CONFIG_MODULE_SIG_FORCE not set, all modules would not load, just > > those loaded in initram time

Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-25 Thread Bruno E. O. Meneguele
On 25-10, Mimi Zohar wrote: > On Wed, 2017-10-25 at 13:05 -0200, Bruno E. O. Meneguele wrote: > > On 24-10, Mimi Zohar wrote: > > > On Tue, 2017-10-24 at 15:37 -0200, Bruno E. O. Meneguele wrote: > > > > When the user requests MODULE_CHECK pol

[PATCH v3 1/2] module: export module signature enforcement status

2017-10-24 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele <brdeo...@redhat.com> --- include/linux/module.h | 7 +++ kernel/module.c| 10 ++ 2 files changed, 17 insertions(+) diff --git a/include/linux/modu

[PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-24 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele <br

[PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-24 Thread Bruno E. O. Meneguele
e changes to correct checkpatch.pl warnings. Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG include/linux/module.h| 7 +++ kernel/module.c | 10

[PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-20 Thread Bruno E. O. Meneguele
10, 386646, "") = 0 The patchset was tested in two different kernels: 4.13.6 (Fedora 27) and 4.14.0-rc4 (integrity-next tree) Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG in

[PATCH 1/2] module: export module signature enforcement status

2017-10-20 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele <brdeo...@redhat.com> --- include/linux/module.h | 2 ++ kernel/module.c| 8 2 files changed, 10 insertions(+) diff --git a/include/linux/module.h b/i

[PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-20 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele <br

[PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-23 Thread Bruno E. O. Meneguele
10, 386646, "") = 0 The patchset was tested in two different kernels: 4.13.6 (Fedora 27) and 4.14.0-rc4 (integrity-next tree) Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG in

[PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-23 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele <br

[PATCH v2 1/2] module: export module signature enforcement status

2017-10-23 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele <brdeo...@redhat.com> --- include/linux/module.h | 2 ++ kernel/module.c| 10 ++ 2 files changed, 12 insertions(+) diff --git a/include/linux/module.h b/i

Re: [PATCH 1/2] module: export module signature enforcement status

2017-10-23 Thread Bruno E. O. Meneguele
On 23-10, Mimi Zohar wrote: > On Fri, 2017-10-20 at 17:19 -0200, Bruno E. O. Meneguele wrote: > > A static variable sig_enforce is used as status var to indicate the real > > value of CONFIG_MODULE_SIG_FORCE, once this one is set the var will hold > > true, but if the CONFIG

Re: [PATCH] lockdown: fix coordination of kernel module signature verification

2018-04-13 Thread Bruno E. O. Meneguele
return 0; > } > > - if (!file && read_id == READING_MODULE) /* MODULE_SIG_FORCE enabled */ > + /* > + * If both IMA-appraisal and appended signature verification are > + * enabled, rely on the appended signature verification. > + */ > + if (sig_e

[PATCH] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele --- security/integrity/ima/ima_main.c | 6 +- 1 file changed, 5

Re: [PATCH] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
On 04-12, Bruno E. O. Meneguele wrote: > Simple but useful message log to the user in case of module appraise is > forced and fails due to the lack of file descriptor, that might be > caused by kmod calls to compressed modules. > > Signed-off-by: Bruno E. O. Meneguele > ---

[PATCH v2] ima: log message to module appraisal error

2017-12-04 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele --- security/integrity/ima/ima_main.c | 6 +- 1 file changed, 5

Re: [PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
On 04-12, Joe Perches wrote: > On Mon, 2017-12-04 at 18:23 -0200, Bruno E. O. Meneguele wrote: > > Simple but useful message log to the user in case of module appraise is > > forced and fails due to the lack of file descriptor, that might be > > caused by kmod calls

[PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele --- security/integrity/ima/ima_main.c | 6 +- 1 file changed, 5

[PATCH v3] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
From: "Bruno E. O. Meneguele" Simple but useful message log to the user in case of module appraise is forced and fails due to the lack of file descriptor, that might be caused by kmod calls to compressed modules. Signed-off-by: Bruno E. O. Meneguele --- security/integrity/ima/ima_

Re: [PATCH v2] ima: log message to module appraisal error

2017-12-05 Thread Bruno E. O. Meneguele
Ignore this erroneously sent email. v2 was already superseded by v3. On 05-12, Bruno E. O. Meneguele wrote: > Simple but useful message log to the user in case of module appraise is > forced and fails due to the lack of file descriptor, that might be > caused by kmod calls to compresse

[PATCH] sched: fix typo on topology error message

2017-08-11 Thread Bruno E. O. Meneguele
Trivial typo correction on kernel/sched/topology.c pr_err() message. Signed-off-by: Bruno E. O. Meneguele --- kernel/sched/topology.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/sched/topology.c b/kernel/sched/topology.c index bd8b6d6f5387..f87de3259b95 100644

Re: [PATCH] lockdown: fix coordination of kernel module signature verification

2018-04-13 Thread Bruno E. O. Meneguele
- if (!file && read_id == READING_MODULE) /* MODULE_SIG_FORCE enabled */ > + /* > + * If both IMA-appraisal and appended signature verification are > + * enabled, rely on the appended signature verification. > + */ > + if (sig_enforce && read_id == READING_MODULE) > return 0; > > /* permit signed certs */ > -- > 2.7.5 > I agree with the solution. Acked-by: Bruno E. O. Meneguele signature.asc Description: PGP signature

[PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-20 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele

[PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-20 Thread Bruno E. O. Meneguele
10, 386646, "") = 0 The patchset was tested in two different kernels: 4.13.6 (Fedora 27) and 4.14.0-rc4 (integrity-next tree) Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG in

[PATCH 1/2] module: export module signature enforcement status

2017-10-20 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele --- include/linux/module.h | 2 ++ kernel/module.c| 8 2 files changed, 10 insertions(+) diff --git a/include/linux/module.h b/include/linux/module.h index

Re: [PATCH 1/2] module: export module signature enforcement status

2017-10-23 Thread Bruno E. O. Meneguele
On 23-10, Mimi Zohar wrote: > On Fri, 2017-10-20 at 17:19 -0200, Bruno E. O. Meneguele wrote: > > A static variable sig_enforce is used as status var to indicate the real > > value of CONFIG_MODULE_SIG_FORCE, once this one is set the var will hold > > true, but if the CONFIG

[PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-23 Thread Bruno E. O. Meneguele
10, 386646, "") = 0 The patchset was tested in two different kernels: 4.13.6 (Fedora 27) and 4.14.0-rc4 (integrity-next tree) Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG in

[PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-23 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele

[PATCH v2 1/2] module: export module signature enforcement status

2017-10-23 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele --- include/linux/module.h | 2 ++ kernel/module.c| 10 ++ 2 files changed, 12 insertions(+) diff --git a/include/linux/module.h b/include/linux/module.h index

[PATCH v3 1/2] module: export module signature enforcement status

2017-10-24 Thread Bruno E. O. Meneguele
value of module signature enforcement, being it from CONFIG value or cmdline param. Signed-off-by: Bruno E. O. Meneguele --- include/linux/module.h | 7 +++ kernel/module.c| 10 ++ 2 files changed, 17 insertions(+) diff --git a/include/linux/module.h b/include/linux/module.h

[PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-24 Thread Bruno E. O. Meneguele
doesn't rely on this value, it checks just CONFIG_MODULE_SIG_FORCE. This patch solves this problem checking for the exported value of module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE, which holds the effective value (CONFIG || param). Signed-off-by: Bruno E. O. Meneguele

[PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy

2017-10-24 Thread Bruno E. O. Meneguele
e changes to correct checkpatch.pl warnings. Bruno E. O. Meneguele (2): module: export module signature enforcement status ima: check signature enforcement against cmdline param instead of CONFIG include/linux/module.h| 7 +++ kernel/module.c | 10

Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-25 Thread Bruno E. O. Meneguele
On 24-10, Mimi Zohar wrote: > On Tue, 2017-10-24 at 15:37 -0200, Bruno E. O. Meneguele wrote: > > When the user requests MODULE_CHECK policy and its kernel is compiled > > with CONFIG_MODULE_SIG_FORCE not set, all modules would not load, just > > those loaded in initram time

Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

2017-10-25 Thread Bruno E. O. Meneguele
On 25-10, Mimi Zohar wrote: > On Wed, 2017-10-25 at 13:05 -0200, Bruno E. O. Meneguele wrote: > > On 24-10, Mimi Zohar wrote: > > > On Tue, 2017-10-24 at 15:37 -0200, Bruno E. O. Meneguele wrote: > > > > When the user requests MODULE_CHECK pol

[PATCH] Char: tpm: fixed white spaces and braces coding style issues

2015-01-17 Thread Bruno E O Meneguele
Fixed some coding style issues. Signed-off-by: Bruno E O Meneguele --- drivers/char/tpm/tpm.h | 10 +- drivers/char/tpm/tpm_i2c_stm_st33.c | 10 ++ 2 files changed, 11 insertions(+), 9 deletions(-) diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h index