Re: [PATCH 3/3] tpm: fix missing migratable flag in sealing functionality for TPM2

2015-11-09 Thread Jarkko Sakkinen
Hi Other fixes are ready for the pull request but for this patch peer check might be useful. I'm anyway sending the pull request with the five pull patches over here even if I don't get 'Tested-by:': https://github.com/jsakkine/linux-tpmdd/commits/fixes I've tested this patch with fTPM and dTPM

Re: [PATCH v2] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm()

2015-11-09 Thread Vladis Dronov
Hello, Paul. >> Did you want the "Reported-by" tag included? I'm also adding the SELinux >> list >> back to the CC line. Yes, could you please, indeed include lost line "Reported-by: Florian Weimer ". It was my fault of omitting it while re-composing commit message. Vladis Dronov | Red Hat,

Re: LSM and sending socketpair created descriptors via unix sockets

2015-11-09 Thread Roman Kubiak
Helo again. I need to get back to this issue, we still don't have a fix for socketpair() and UDS sockets. I was wondering if the fix i posted is ok (apart from the variables beeing named inode), as you can see this fields in the structure are initialized in smack_sk_alloc_security (to cover th

Re: [PATCH v4] keys, trusted: select hash algorithm for TPM2 chips

2015-11-09 Thread James Morris
On Thu, 5 Nov 2015, Jarkko Sakkinen wrote: > v4: > > * Added missing select CRYPTO_HASH_INFO in drivers/char/tpm/Kconfig > > Signed-off-by: Jarkko Sakkinen Reviewed-by: James Morris -- James Morris -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in t

Re: [PATCH v5 3/3] Allows reading back the current IMA policy;

2015-11-09 Thread Mimi Zohar
On Mon, 2015-11-02 at 00:39 +0200, Petko Manolov wrote: > + > +#ifdef CONFIG_IMA_READ_POLICY > +enum { > + mask_err = -1, > + mask_exec = 1, mask_write, mask_read, mask_append > +}; > + > +static match_table_t mask_tokens = { > + {mask_exec, "MAY_EXEC"}, > + {mask_write, "MAY

Re: [PATCH v4 00/11] Smack namespace

2015-11-09 Thread Lukasz Pawelczyk
If I understand correctly the security window for 4.4 has been closed now (as changes went to next). Anyway, I updated the series to the latest smack-for-4.4 branch. Including the new relabel-self interface that received namespace treatment as well. Also the RCU fix reported on the list has been i

Re: [PATCH] ptrace: use fsuid, fsgid, effective creds for fs access checks

2015-11-09 Thread Andrew Morton
On Sun, 8 Nov 2015 13:08:36 +0100 Jann Horn wrote: > By checking the effective credentials instead of the real UID / > permitted capabilities, ensure that the calling process actually > intended to use its credentials. > > To ensure that all ptrace checks use the correct caller > credentials (e

Re: [PATCH] ptrace: use fsuid, fsgid, effective creds for fs access checks

2015-11-09 Thread Willy Tarreau
On Mon, Nov 09, 2015 at 12:55:54PM -0800, Andrew Morton wrote: > > --- a/fs/proc/array.c > > +++ b/fs/proc/array.c > > @@ -395,7 +395,8 @@ static int do_task_stat(struct seq_file *m, struct > > pid_namespace *ns, > > > > state = *get_task_state(task); > > vsize = eip = esp = 0; > > - p

Re: [PATCH] ptrace: use fsuid, fsgid, effective creds for fs access checks

2015-11-09 Thread Jann Horn
On Mon, Nov 09, 2015 at 12:55:54PM -0800, Andrew Morton wrote: > On Sun, 8 Nov 2015 13:08:36 +0100 Jann Horn wrote: > > > By checking the effective credentials instead of the real UID / > > permitted capabilities, ensure that the calling process actually > > intended to use its credentials. > >

Re: [PATCH] ptrace: use fsuid, fsgid, effective creds for fs access checks

2015-11-09 Thread Andrew Morton
On Mon, 9 Nov 2015 22:12:09 +0100 Jann Horn wrote: > > > Can we do > > > > #define PTRACE_foo (PTRACE_MODE_READ|PTRACE_MODE_FSCREDS) > > > > to avoid all that? > > Hm. All combinations of the PTRACE_MODE_*CREDS flags with > PTRACE_MODE_{READ,ATTACH} plus optionally PTRACE_MODE_NOAUDIT > make s

Re: [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments

2015-11-09 Thread Al Viro
On Wed, Oct 14, 2015 at 02:41:57PM +0200, Lukasz Pawelczyk wrote: > int (*getprocattr)(struct task_struct *p, char *name, char **value); > - int (*setprocattr)(struct task_struct *p, char *name, void *value, > - size_t size); > + int (*setprocattr)(struct t