public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: [GIT] SELinux changes for 2.6.23 (updated)
@ 2007-07-13 10:41 Paul Moore
  2007-07-13 19:08 ` The art of breaking userspace (was Re: [GIT] SELinux changes for 2.6.23 (updated)) Michal Piotrowski
  0 siblings, 1 reply; 7+ messages in thread
From: Paul Moore @ 2007-07-13 10:41 UTC (permalink / raw)
  To: jmorris; +Cc: michal.k.k.piotrowski, torvalds, linux-kernel, sds

-----Original Message-----
From: James Morris <jmorris@namei.org>
Date: Thursday, Jul 12, 2007 10:50 pm
Subject: Re: [GIT] SELinux changes for 2.6.23 (updated)
To: Michal Piotrowski <michal.k.k.piotrowski@gmail.com>
CC: Linus Torvalds <torvalds@linux-foundation.org>,	linux-kernel@vger.kernel.org, Stephen Smalley <sds@tycho.nsa.gov>,	Paul Moore <paul.moore@hp.com>

On Fri, 13 Jul 2007, Michal Piotrowski wrote:
>
>> 
> My system is too secure, I can not login :)
>
>Do you have CONFIG_NETLABEL=y ?
>
>If so, please try disabling it.

Disabling NetLabel should solve the problem.  The recommended solution to this problem, as discussed on the SELinux list and mentioned in the patch description, is to upgrade your SELinux policy to the latest Reference Policy sources.  For those with custom SELinux policy, the patch description explains the changes to the SELinux policy required. 

If needed I can post more instructions later, let me know, but right now I'm tapping this out on my phone while at the airport.

. paul moore
. linux security @ hp



^ permalink raw reply	[flat|nested] 7+ messages in thread
* [GIT] SELinux changes for 2.6.23 (updated)
@ 2007-07-12  3:20 James Morris
  2007-07-12 23:39 ` Michal Piotrowski
  0 siblings, 1 reply; 7+ messages in thread
From: James Morris @ 2007-07-12  3:20 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: linux-kernel, Stephen Smalley

This is an updated set of 2.6.23 SELinux changes, rebased & tested against 
current git.  The vmsplice patch has been dropped from this and will be 
resubmitted via Jens.  Also added an ack from Chris Wright for the mmap 
null dereference hooks (which I'd forgotten to add to my tree some time 
ago).

Please pull.


The following changes since commit 4eb6bf6bfb580afaf1e1a1d30cba17a078530cf4:
  Alan Cox (1):
        lots-of-architectures: enable arbitary speed tty support

are found in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-linus

Adrian Bunk (1):
      security: unexport mmap_min_addr

Christopher J. PeBenito (4):
      selinux: add support for querying object classes and permissions from the running policy
      selinux: rename sel_remove_bools() for more general usage.
      selinux: change sel_make_dir() to specify inode counter.
      selinux: add selinuxfs structure for object class discovery

Eric Paris (2):
      selinux: introduce schedule points in policydb_destroy()
      security: Protection for exploiting null dereference using mmap

Paul Moore (1):
      SELinux: use SECINITSID_NETMSG instead of SECINITSID_UNLABELED for NetLabel

Stephen Smalley (1):
      SELinux: allow preemption between transition permission checks

Tobias Oed (1):
      SELinux: Use %lu for inode->i_no when printing avc

 Documentation/sysctl/vm.txt                  |   15 ++
 include/linux/security.h                     |   17 ++-
 kernel/sysctl.c                              |   10 +
 mm/mmap.c                                    |    4 +-
 mm/mremap.c                                  |   13 +-
 mm/nommu.c                                   |    2 +-
 security/dummy.c                             |    6 +-
 security/security.c                          |    1 +
 security/selinux/avc.c                       |   12 +-
 security/selinux/hooks.c                     |   42 +++--
 security/selinux/include/av_perm_to_string.h |    1 +
 security/selinux/include/av_permissions.h    |    1 +
 security/selinux/include/avc.h               |    6 +-
 security/selinux/include/class_to_string.h   |    1 +
 security/selinux/include/flask.h             |    1 +
 security/selinux/include/security.h          |    4 +
 security/selinux/netlabel.c                  |   34 ++--
 security/selinux/selinuxfs.c                 |  269 +++++++++++++++++++++++++-
 security/selinux/ss/policydb.c               |    7 +
 security/selinux/ss/services.c               |  144 ++++++++++++--
 20 files changed, 504 insertions(+), 86 deletions(-)

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2007-07-14  3:25 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-07-13 10:41 [GIT] SELinux changes for 2.6.23 (updated) Paul Moore
2007-07-13 19:08 ` The art of breaking userspace (was Re: [GIT] SELinux changes for 2.6.23 (updated)) Michal Piotrowski
2007-07-13 19:29   ` Stephen Smalley
2007-07-14  3:20     ` Paul Moore
  -- strict thread matches above, loose matches on Subject: below --
2007-07-12  3:20 [GIT] SELinux changes for 2.6.23 (updated) James Morris
2007-07-12 23:39 ` Michal Piotrowski
2007-07-13  2:49   ` James Morris

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox