-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'linus' into core/softlockup
Conflicts: kernel/sysctl.c
- Loading branch information
Showing
8,592 changed files
with
946,876 additions
and
372,346 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
What: /sys/kernel/debug/kmemtrace/ | ||
Date: July 2008 | ||
Contact: Eduard - Gabriel Munteanu <eduard.munteanu@linux360.ro> | ||
Description: | ||
|
||
In kmemtrace-enabled kernels, the following files are created: | ||
|
||
/sys/kernel/debug/kmemtrace/ | ||
cpu<n> (0400) Per-CPU tracing data, see below. (binary) | ||
total_overruns (0400) Total number of bytes which were dropped from | ||
cpu<n> files because of full buffer condition, | ||
non-binary. (text) | ||
abi_version (0400) Kernel's kmemtrace ABI version. (text) | ||
|
||
Each per-CPU file should be read according to the relay interface. That is, | ||
the reader should set affinity to that specific CPU and, as currently done by | ||
the userspace application (though there are other methods), use poll() with | ||
an infinite timeout before every read(). Otherwise, erroneous data may be | ||
read. The binary data has the following _core_ format: | ||
|
||
Event ID (1 byte) Unsigned integer, one of: | ||
0 - represents an allocation (KMEMTRACE_EVENT_ALLOC) | ||
1 - represents a freeing of previously allocated memory | ||
(KMEMTRACE_EVENT_FREE) | ||
Type ID (1 byte) Unsigned integer, one of: | ||
0 - this is a kmalloc() / kfree() | ||
1 - this is a kmem_cache_alloc() / kmem_cache_free() | ||
2 - this is a __get_free_pages() et al. | ||
Event size (2 bytes) Unsigned integer representing the | ||
size of this event. Used to extend | ||
kmemtrace. Discard the bytes you | ||
don't know about. | ||
Sequence number (4 bytes) Signed integer used to reorder data | ||
logged on SMP machines. Wraparound | ||
must be taken into account, although | ||
it is unlikely. | ||
Caller address (8 bytes) Return address to the caller. | ||
Pointer to mem (8 bytes) Pointer to target memory area. Can be | ||
NULL, but not all such calls might be | ||
recorded. | ||
|
||
In case of KMEMTRACE_EVENT_ALLOC events, the next fields follow: | ||
|
||
Requested bytes (8 bytes) Total number of requested bytes, | ||
unsigned, must not be zero. | ||
Allocated bytes (8 bytes) Total number of actually allocated | ||
bytes, unsigned, must not be lower | ||
than requested bytes. | ||
Requested flags (4 bytes) GFP flags supplied by the caller. | ||
Target CPU (4 bytes) Signed integer, valid for event id 1. | ||
If equal to -1, target CPU is the same | ||
as origin CPU, but the reverse might | ||
not be true. | ||
|
||
The data is made available in the same endianness the machine has. | ||
|
||
Other event ids and type ids may be defined and added. Other fields may be | ||
added by increasing event size, but see below for details. | ||
Every modification to the ABI, including new id definitions, are followed | ||
by bumping the ABI version by one. | ||
|
||
Adding new data to the packet (features) is done at the end of the mandatory | ||
data: | ||
Feature size (2 byte) | ||
Feature ID (1 byte) | ||
Feature data (Feature size - 3 bytes) | ||
|
||
|
||
Users: | ||
kmemtrace-user - git://repo.or.cz/kmemtrace-user.git | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,61 @@ | ||
What: security/ima/policy | ||
Date: May 2008 | ||
Contact: Mimi Zohar <zohar@us.ibm.com> | ||
Description: | ||
The Trusted Computing Group(TCG) runtime Integrity | ||
Measurement Architecture(IMA) maintains a list of hash | ||
values of executables and other sensitive system files | ||
loaded into the run-time of this system. At runtime, | ||
the policy can be constrained based on LSM specific data. | ||
Policies are loaded into the securityfs file ima/policy | ||
by opening the file, writing the rules one at a time and | ||
then closing the file. The new policy takes effect after | ||
the file ima/policy is closed. | ||
|
||
rule format: action [condition ...] | ||
|
||
action: measure | dont_measure | ||
condition:= base | lsm | ||
base: [[func=] [mask=] [fsmagic=] [uid=]] | ||
lsm: [[subj_user=] [subj_role=] [subj_type=] | ||
[obj_user=] [obj_role=] [obj_type=]] | ||
|
||
base: func:= [BPRM_CHECK][FILE_MMAP][INODE_PERMISSION] | ||
mask:= [MAY_READ] [MAY_WRITE] [MAY_APPEND] [MAY_EXEC] | ||
fsmagic:= hex value | ||
uid:= decimal value | ||
lsm: are LSM specific | ||
|
||
default policy: | ||
# PROC_SUPER_MAGIC | ||
dont_measure fsmagic=0x9fa0 | ||
# SYSFS_MAGIC | ||
dont_measure fsmagic=0x62656572 | ||
# DEBUGFS_MAGIC | ||
dont_measure fsmagic=0x64626720 | ||
# TMPFS_MAGIC | ||
dont_measure fsmagic=0x01021994 | ||
# SECURITYFS_MAGIC | ||
dont_measure fsmagic=0x73636673 | ||
|
||
measure func=BPRM_CHECK | ||
measure func=FILE_MMAP mask=MAY_EXEC | ||
measure func=INODE_PERM mask=MAY_READ uid=0 | ||
|
||
The default policy measures all executables in bprm_check, | ||
all files mmapped executable in file_mmap, and all files | ||
open for read by root in inode_permission. | ||
|
||
Examples of LSM specific definitions: | ||
|
||
SELinux: | ||
# SELINUX_MAGIC | ||
dont_measure fsmagic=0xF97CFF8C | ||
|
||
dont_measure obj_type=var_log_t | ||
dont_measure obj_type=auditd_log_t | ||
measure subj_user=system_u func=INODE_PERM mask=MAY_READ | ||
measure subj_role=system_r func=INODE_PERM mask=MAY_READ | ||
|
||
Smack: | ||
measure subj_user=_ func=INODE_PERM mask=MAY_READ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.