Building a kernel with my configuration failed with:
> drivers/built-in.o: In function `hid_sensor_setup_batch_mode':
> staging/drivers/iio/common/hid-sensors/hid-sensor-trigger.c:104: undefined
> reference to `iio_buffer_set_attrs'
which is fixed by this patch.
Signe
ps://www4.cs.fau.de/Lehre/WS14/P_PASST/kernel-commits-all.shtml
Greetings,
Alexander Wuerstlein.
Alexander Wuerstlein Informatik 4Univ. of Erlangen
Martensstrasse 191058 Erlangen +49-9131-85-27824
a...@arw.name a...@cs.fau.de 3CD3D074014E217A745FC
On 070626 01:56, Satyam Sharma <[EMAIL PROTECTED]> wrote:
> On 6/25/07, Alexander Wuerstlein
> <[EMAIL PROTECTED]> wrote:
>> On 070622 21:40, Satyam Sharma <[EMAIL PROTECTED]> wrote:
>> > [...]
>> We decided against
>> altering the file itself fo
se it for anything but playing around as it is
atm. ;)
We only used HMAC because it was already available inside the kernel, for
implementing real asymetric cryptography there was simply no time. Of course
our next objective is to implement that.
Ciao,
Alexander Wuerstlein.
pgpFf6MgaeqbK.pgp
Description: PGP signature
Makes it possible for a userspace process to ask for the trustworthiness of
another process.
Signed-off-by: Johannes Schlumberger <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1 +
include/asm-i386/unistd.h|3 ++-
security/sns.c | 15 +++
Modified task_struct to hold a 'signed flag' which is set on exec(), inherited
on fork() and checked during exec before giving the new process suid/sgid
privileges.
sns.c contains our helper functions to verify the signatures.
sns_secret_key.dat contains the 'secret key' which is used for HMAC.
S
From: Johannes Schlumberger <[EMAIL PROTECTED]>
Checks on mmap and mprotect (i.e. libraries) wether they are signed and adjusts
the processe's signed flag accordingly.
If a process looses its signed state it gets, in our current design, killed, for
it is no longer trustworthy. A process also loos
From: Johannes Schlumberger <[EMAIL PROTECTED]>
Makes it possible to get extended attributes for a given inode. We need this
for cases where we no longer have the corresponding direntry.
Signed-off-by: Johannes Schlumberger <[EMAIL PROTECTED]>
---
fs/xattr.c| 18 ++
On 070621 19:33, Arjan van de Ven <[EMAIL PROTECTED]> wrote:
> On Thu, 2007-06-21 at 19:25 +0200, Alexander Wuerstlein wrote:
> > On 070621 19:21, Arjan van de Ven <[EMAIL PROTECTED]> wrote:
> > > On Thu, 2007-06-21 at 18:02 +0200, Alexander Wuerstlein wrote:
> >
On 070621 19:26, Adrian Bunk <[EMAIL PROTECTED]> wrote:
> On Thu, Jun 21, 2007 at 06:29:17PM +0200, Alexander Wuerstlein wrote:
> > On 070621 18:19, Adrian Bunk <[EMAIL PROTECTED]> wrote:
> > > On Thu, Jun 21, 2007 at 05:55:16PM +0200, Johannes Schlumb
On 070621 19:21, Arjan van de Ven <[EMAIL PROTECTED]> wrote:
> On Thu, 2007-06-21 at 18:02 +0200, Alexander Wuerstlein wrote:
> > Modified task_struct to hold a 'signed flag' which is set on exec(),
> > inherited
> > on fork() and checked during exec be
On 070621 18:34, Akinobu Mita <[EMAIL PROTECTED]> wrote:
> 2007/6/22, Alexander Wuerstlein <[EMAIL PROTECTED]>:
>
>> +asmlinkage int sys_sns_is_trusted(pid_t p)
>> +{
>> + struct task_struct *t;
>> + rcu_read_lock();
>> +
acker controls some filesystems
(on external storage perhaps) where he can of course manipulate the suid bit,
but he does not have direct control over the attacked system unless he can
execute that file.
Ciao,
Alexander Wuerstlein.
-
To unsubscribe from this list: send the line "unsubscribe
Modified task_struct to hold a 'signed flag' which is set on exec(), inherited
on fork() and checked during exec before giving the new process suid/sgid
privileges.
sns.c contains our helper functions to verify the signatures.
sns_secret_key.dat contains the 'secret key' which is used for HMAC.
S
From: Johannes Schlumberger <[EMAIL PROTECTED]>
Checks on mmap and mprotect (i.e. libraries) wether they are signed and adjusts
the processe's signed flag accordingly.
If a process looses its signed state it gets, in our current design, killed, for
it is no longer trustworthy. A process also loos
Makes it possible for a userspace process to ask for the trustworthiness of
another process.
Signed-off-by: Johannes Schlumberger <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1 +
include/asm-i386/unistd.h|3 ++-
security/sns.c | 15 +++
From: Johannes Schlumberger <[EMAIL PROTECTED]>
Makes it possible to get extended attributes for a given inode. We need this
for cases where we no longer have the corresponding direntry.
Signed-off-by: Johannes Schlumberger <[EMAIL PROTECTED]>
---
fs/xattr.c| 18 ++
17 matches
Mail list logo