Displaying 20 results from an estimated 1000 matches similar to: "[Bug 2142] New: openssh sandboxing using libseccomp"
2014 Dec 13
2
[LLVMdev] Cannot split vector result of AVX intrinsic _mm256_rsqrt_ps
I'm getting this on LLVM trunk:
SplitVectorResult #0: 0x27e6250: v8f32 = llvm.x86.avx.rsqrt.ps.256
0x2739310, 0x2739420 [ORD=16] [ID=0]
LLVM ERROR: Do not know how to split the result of this operator!
clang: error: linker command failed with exit code 1 (use -v to see invocation)
Oddly, when I build the same code without -flto I don't see this issue.
I see a similar bug was reported
2014 Mar 05
2
[LLVMdev] github's llvm mirror down
Just curious, what's the reason we don't make the github mirrors the
official mirrors? ...besides not knowing how to revive them when they
go down. :)
-Greg
On Tue, Mar 4, 2014 at 5:35 PM, Steven Noonan <steven at uplinklabs.net> wrote:
> Someone should enable the smart HTTP protocol:
>
> https://www.kernel.org/pub/software/scm/git/docs/git-http-backend.html
>
> On
2014 Mar 05
3
[LLVMdev] github's llvm mirror down
> LLVM has its own mirror at http://llvm.org/git/llvm.git, if that suits your needs.
The llvm.org mirror seems to be quite a bit slower (~3.5x). I think
it's because github lets me use the git protocol whereas llvm.org
suggests http. When I try to clone "git at llvm.org:git/llvm.git", I'm
asked for a password for user 'git'.
-Greg
On Tue, Mar 4, 2014 at 3:54 PM,
2015 Mar 05
31
[Bug 2361] New: seccomp filter (not only) for aarch64
https://bugzilla.mindrot.org/show_bug.cgi?id=2361
Bug ID: 2361
Summary: seccomp filter (not only) for aarch64
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2020 Mar 05
3
[Bug 14315] New: rsync hangs when many errors
https://bugzilla.samba.org/show_bug.cgi?id=14315
Bug ID: 14315
Summary: rsync hangs when many errors
Product: rsync
Version: 3.1.3
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: core
Assignee: wayne at opencoder.net
Reporter: mvitale at
2010 Aug 08
4
[LLVMdev] MmapAllocator
Hi folks,
I've been doing work on memory reduction in Unladen Swallow, and
during testing, LiveRanges seemed to be consuming one of the largest
chunks of memory. I wrote a replacement allocator for use by
BumpPtrAllocator which uses mmap()/munmap() in place of
malloc()/free(). It has worked flawlessly in testing, and reduces
memory usage quite nicely in Unladen Swallow.
The code is available
2016 Jan 14
4
Proposal: always handle keys in separate process
Hello,
in light of the recent CVE-2016-0777, I came up with the following idea,
that would have lessened its impact. Feel free to ignore or flame me,
maybe its stupid or I missed something :)
- private key material should only ever be handled in a separate process
from the SSH client. ssh-agent (maybe slightly extended) seems the
logical choice.
- in places where the client currently reads
2012 Jul 25
3
seccomp_filter
Can I configure openssh with --sandbox=seccomp_filter and have it still run
on older kernels with sandboxing via rlimit? I'm asking from a linux
distro packaging
point of view. Does --sandbox=seccomp_filter keep the rlimit sandbox?
It looks to
me as if I can only link in one of the sandbox plugins.
An openssh build with seccomp_filter enabled will probably have no sandbox
at all on linux <
2015 Feb 11
2
[PATCH] seccomp: allow the getrandom system call.
*SSL libraries or the C library may/will require it.
---
sandbox-seccomp-filter.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/sandbox-seccomp-filter.c b/sandbox-seccomp-filter.c
index b6f6258..846bc08 100644
--- a/sandbox-seccomp-filter.c
+++ b/sandbox-seccomp-filter.c
@@ -129,6 +129,9 @@ static const struct sock_filter preauth_insns[] = {
#else
SC_ALLOW(sigprocmask),
#endif
2010 Aug 08
0
[LLVMdev] MmapAllocator
Hi Steven-
Nice, but will this not break Windows? From an initial glance over your patch, it seems to assume the existence of mmap() in some form or other.
Alistair
On 8 Aug 2010, at 03:05, Steven Noonan wrote:
> Hi folks,
>
> I've been doing work on memory reduction in Unladen Swallow, and
> during testing, LiveRanges seemed to be consuming one of the largest
> chunks of
2017 May 09
5
[PATCH 0/3] Allow syscalls for openssl engines
This patchset allow syscalls (flock, ipc, getuid, geteuid and ioctl), so
openssl engines, e.g. OpenSSL-ibmca and OpenSSL-ibmpkcs11, can work and
communicate with the crypto cards during ssh login.
1. The flock and ipc are allowed only for s390 architecture. They are needed
for openCryptoki project (PKCS#11 implementation), as the ibmpkcs11 engine
makes use of openCryptoki.
For more information,
2017 Mar 14
2
[PATCH] Enable specific ioctl calls for ICA crypto card (s390)
I've committed this diff. Please test and confirm that it works ok.
(If not, then I've botched the macro fixes in the previous commit)
Thanks,
Damien Miller
On Tue, 14 Mar 2017, Damien Miller wrote:
> ok, with the fixes for the seccomp-bpf sandbox that I just committed
> the diff reduces to.
>
> IMO this is scoped narrowly enough to go in.
>
> -d
>
> diff
2017 Feb 13
2
[PATCH] Enable specific ioctl calls for ICA crypto card (s390)
This patch enables specific ioctl calls for ICA crypto card on s390
platform. Without this patch, users using the IBMCA engine are not able
to perform ssh login as the filter blocks the communication with the
crypto card.
Signed-off-by: Harald Freudenberger <freude at linux.vnet.ibm.com>
Signed-off-by: Eduardo Barretto <ebarretto at linux.vnet.ibm.com>
---
sandbox-seccomp-filter.c |
2017 Mar 03
2
[PATCH] Enable specific ioctl calls for ICA crypto card (s390)
On 03-03-2017 09:54, Petr Cerny wrote:
> Damien Miller wrote:
>> On Tue, 28 Feb 2017, Eduardo Barretto wrote:
>>
>>> On 13-02-2017 13:23, Eduardo Barretto wrote:
>>> > This patch enables specific ioctl calls for ICA crypto card on s390
>>> > platform. Without this patch, users using the IBMCA engine are not
>>> able
>>> > to
2017 Mar 02
2
[PATCH] Enable specific ioctl calls for ICA crypto card (s390)
On Tue, 28 Feb 2017, Eduardo Barretto wrote:
> On 13-02-2017 13:23, Eduardo Barretto wrote:
> > This patch enables specific ioctl calls for ICA crypto card on s390
> > platform. Without this patch, users using the IBMCA engine are not able
> > to perform ssh login as the filter blocks the communication with the
> > crypto card.
> >
> > Signed-off-by: Harald
2017 Sep 18
4
Update from 7.3 to 7.4 failing because of architecture change from PPC64 to PPC
Hello,
I'm having problems updating from 7.3 to 7.4 on my ppc64 (IBM Power7
p770) installation.
yum update stops with
Error: Multilib version problems found.
[..]
Protected multilib versions: systemd-libs-219-42.el7.ppc !=
systemd-libs-219-42.el7_4.1.ppc64
When I scroll back through the transaction check I see various package
dependencies for *.ppc instead of *.ppc64.
First appearance in
2022 May 06
12
[Bug 3430] New: 64 bit time and seccomp conflict
https://bugzilla.mindrot.org/show_bug.cgi?id=3430
Bug ID: 3430
Summary: 64 bit time and seccomp conflict
Product: Portable OpenSSH
Version: 8.9p1
Hardware: ARM
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2013 Feb 07
6
[Bug 2069] New: arm support for sandbox_seccomp_filter
https://bugzilla.mindrot.org/show_bug.cgi?id=2069
Bug ID: 2069
Summary: arm support for sandbox_seccomp_filter
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2002 Sep 28
1
oplock problem - how to fix?
Hi everyone,
Trying to copy a 3.5MB file from a Windows 2000 workstation to a FreeBSD
4.6.2 server running samba-2.2.6.p2. The 3.5MB file is an MS Access file
called MoldFE.mdb. After a few seconds of copying the file, a message box
pops up on the W2K workstation that states "Cannot copy MoldFE: The
specified network name is no longer available". In /var/log/messages, I see
this:
2019 Oct 31
37
[Bug 3085] New: seccomp issue after upgrading openssl
https://bugzilla.mindrot.org/show_bug.cgi?id=3085
Bug ID: 3085
Summary: seccomp issue after upgrading openssl
Product: Portable OpenSSH
Version: 8.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org