lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 29 Oct 2008 08:56:07 -0700
From:	Rob MacKinnon <c4blem0nkey@...il.com>
To:	Casey Schaufler <casey@...aufler-ca.com>
CC:	rob.mackinnon@...il.com, Andreas Gruenbacher <agruen@...e.de>,
	Stephen Smalley <sds@...ho.nsa.gov>, hpa@...or.com,
	hugh@...itas.com, linux-kernel@...r.kernel.org
Subject: Re: tmpfs support of xattrs?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Casey Schaufler wrote:
> Rob MacKinnon wrote:
>> Andreas Gruenbacher wrote:
>>  
>>> On Monday, 27 October 2008 21:25:31 Stephen Smalley wrote:
>>>    
>>>> Looks like a bug in Smack's implementation of the inode_listsecurity
>>>> hook to me.  Did you mean to enable Smack in your kernel config?
>>>>       
>>> Yes, there is at least one bug there; this kernel is broken. You may
>>> want to try booting with a kernel command line option like
>>> "security=none", which *should* turn smack off.
>>>
>>> Andreas
>>>     
>>
>> All,
>>
>> Indeed the kernel cmdline option security=none did disable smack. So
>> atleast that works. Thank you all for helping me track this down.  I can
>> now return to updating packages (some of which have been waiting
>> patiently for this to be cleared up)!  Though I will be looking forward
>> to this feature working as it was intended. ;)  Let me know if there is
>> a bug # assigned and I'll quietly return to lurking... ;
> 
> It looks like a trivial fix and the patch is here. I have just started
> testing it myself, but if I don't send it now it will be Wednesday before
> I do. No sign-off because I haven't verified it, but I would be delighted
> if you would pass judgement on its efficacy. Thank you.
> 

All,

Applied, compiled, and tested clean on a P4 Prescott. I'll try this a
little later on my x64. Thank you for this fix, and thank you all for
just a fast response.

- -- Rob

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=lrma
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ