lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 8 Jul 2010 16:32:42 +0100 From: Tvrtko Ursulin <tvrtko.ursulin@...hos.com> To: Greg KH <greg@...ah.com> CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Al Viro <viro@...iv.linux.org.uk> Subject: Re: BUG: Securityfs and bind mounts (2.6.34) On Thursday 08 Jul 2010 16:20:59 Greg KH wrote: > > :) Well I do not know, but, it kind of smelled like a bug in the > > : vfs/mount > > > > handling/securityfs area so I thought to let experts know. I _think_ I > > did nothing that much wrong. Just used the exposed API > > (securityfs_remove) and some bind mount shuffling from userspace. > > securitfs just uses libfs underneath it, and really doesn't have any > bindings for module ownerships, so I wouldn't recommend doing what you > just did. Just do double check what you are saying, securityfs is not safe for use from modules? If so I would then recommend removing the exports otherwise it is an invitation to shoot yourself into the foot. Also, in-three TPM driver can be built as a module so how does that work? Tvrtko Sophos Plc, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, United Kingdom. Company Reg No 2096520. VAT Reg No GB 348 3873 20. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists