2024-02-27 11:16:02

by Mickaël Salaün

[permalink] [raw]
Subject: [PATCH v2 1/2] landlock: Extend documentation for kernel support

Extend the kernel support section with one subsection for build time
configuration and another for boot time configuration.

Extend the boot time subsection with a concrete example.

Update the journalctl command to include the boot option.

Cc: Günther Noack <[email protected]>
Cc: Kees Cook <[email protected]>
Signed-off-by: Mickaël Salaün <[email protected]>
---

Changes since v1:
* New patch, suggested by Kees Cook.
---
Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
1 file changed, 51 insertions(+), 6 deletions(-)

diff --git a/Documentation/userspace-api/landlock.rst b/Documentation/userspace-api/landlock.rst
index 2e3822677061..838cc27db232 100644
--- a/Documentation/userspace-api/landlock.rst
+++ b/Documentation/userspace-api/landlock.rst
@@ -19,11 +19,12 @@ unexpected/malicious behaviors in user space applications. Landlock empowers
any process, including unprivileged ones, to securely restrict themselves.

We can quickly make sure that Landlock is enabled in the running system by
-looking for "landlock: Up and running" in kernel logs (as root): ``dmesg | grep
-landlock || journalctl -kg landlock`` . Developers can also easily check for
-Landlock support with a :ref:`related system call <landlock_abi_versions>`. If
-Landlock is not currently supported, we need to :ref:`configure the kernel
-appropriately <kernel_support>`.
+looking for "landlock: Up and running" in kernel logs (as root):
+``dmesg | grep landlock || journalctl -kb -g landlock`` .
+Developers can also easily check for Landlock support with a
+:ref:`related system call <landlock_abi_versions>`.
+If Landlock is not currently supported, we need to
+:ref:`configure the kernel appropriately <kernel_support>`.

Landlock rules
==============
@@ -499,6 +500,9 @@ access rights.
Kernel support
==============

+Build time configuration
+------------------------
+
Landlock was first introduced in Linux 5.13 but it must be configured at build
time with ``CONFIG_SECURITY_LANDLOCK=y``. Landlock must also be enabled at boot
time as the other security modules. The list of security modules enabled by
@@ -507,11 +511,52 @@ contains ``CONFIG_LSM=landlock,[...]`` with ``[...]`` as the list of other
potentially useful security modules for the running system (see the
``CONFIG_LSM`` help).

+Boot time configuration
+-----------------------
+
If the running kernel does not have ``landlock`` in ``CONFIG_LSM``, then we can
-still enable it by adding ``lsm=landlock,[...]`` to
+enable Landlock by adding ``lsm=landlock,[...]`` to
Documentation/admin-guide/kernel-parameters.rst thanks to the bootloader
configuration.

+For example, if the current built-in configuration is:
+
+.. code-block:: console
+
+ $ zgrep -h "^CONFIG_LSM=" "/boot/config-$(uname -r)" /proc/config.gz 2>/dev/null
+ CONFIG_LSM="lockdown,yama,integrity,apparmor"
+
+...and if the cmdline doesn't contain ``landlock`` either:
+
+.. code-block:: console
+
+ $ sed -n 's/.*\(\<lsm=\S\+\).*/\1/p' /proc/cmdline
+ lsm=lockdown,yama,integrity,apparmor
+
+...we should configure the bootloader to set a cmdline extending the ``lsm``
+list with the ``landlock,`` prefix::
+
+ lsm=landlock,lockdown,yama,integrity,apparmor
+
+After a reboot, we can check that Landlock is up and running by looking at
+kernel logs:
+
+.. code-block:: console
+
+ # dmesg | grep landlock || journalctl -kb -g landlock
+ [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
+ [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
+ [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
+ [ 0.000000] landlock: Up and running.
+
+Note that according to the built time kernel configuration,
+``lockdown,capability,`` may always stay at the beginning of the ``LSM:
+initializing lsm=`` list even if they are not configured with the bootloader,
+which is OK.
+
+Network support
+---------------
+
To be able to explicitly allow TCP operations (e.g., adding a network rule with
``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
(``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an

base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
--
2.44.0



2024-02-27 17:00:16

by Günther Noack

[permalink] [raw]
Subject: Re: [PATCH v2 1/2] landlock: Extend documentation for kernel support

On Tue, Feb 27, 2024 at 12:05:49PM +0100, Mickaël Salaün wrote:
> Extend the kernel support section with one subsection for build time
> configuration and another for boot time configuration.
>
> Extend the boot time subsection with a concrete example.
>
> Update the journalctl command to include the boot option.
>
> Cc: Günther Noack <[email protected]>
> Cc: Kees Cook <[email protected]>
> Signed-off-by: Mickaël Salaün <[email protected]>
> ---
>
> Changes since v1:
> * New patch, suggested by Kees Cook.
> ---
> Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
> 1 file changed, 51 insertions(+), 6 deletions(-)
>
> diff --git a/Documentation/userspace-api/landlock.rst b/Documentation/userspace-api/landlock.rst
> index 2e3822677061..838cc27db232 100644
> --- a/Documentation/userspace-api/landlock.rst
> +++ b/Documentation/userspace-api/landlock.rst
> +Boot time configuration
> +-----------------------
> +
> If the running kernel does not have ``landlock`` in ``CONFIG_LSM``, then we can
> -still enable it by adding ``lsm=landlock,[...]`` to
> +enable Landlock by adding ``lsm=landlock,[...]`` to
> Documentation/admin-guide/kernel-parameters.rst thanks to the bootloader
> configuration.

I would suggest: s/thanks to/in/

> +For example, if the current built-in configuration is:
> +
> +.. code-block:: console
> +
> + $ zgrep -h "^CONFIG_LSM=" "/boot/config-$(uname -r)" /proc/config.gz 2>/dev/null
> + CONFIG_LSM="lockdown,yama,integrity,apparmor"
> +
> +...and if the cmdline doesn't contain ``landlock`` either:
> +
> +.. code-block:: console
> +
> + $ sed -n 's/.*\(\<lsm=\S\+\).*/\1/p' /proc/cmdline
> + lsm=lockdown,yama,integrity,apparmor
> +
> +...we should configure the bootloader to set a cmdline extending the ``lsm``
> +list with the ``landlock,`` prefix::

Nit: Is the double colon at the end of this line accidental?
(It does not appear before the previous code block.)

> +
> + lsm=landlock,lockdown,yama,integrity,apparmor
> +
> +After a reboot, we can check that Landlock is up and running by looking at
> +kernel logs:
> +
> +.. code-block:: console
> +
> + # dmesg | grep landlock || journalctl -kb -g landlock
> + [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> + [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> + [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
> + [ 0.000000] landlock: Up and running.
> +
> +Note that according to the built time kernel configuration,

s/built time/build time/
^

It feels like the phrase "according to" could be slightly more specific here.

To paraphrase Alejandro Colomar, "Note that" is usually redundant.
https://lore.kernel.org/all/[email protected]/

I'd suggest:

The kernel may be configured at build time to always load the ``lockdown`` and
``capability`` LSMs. In that case, these LSMs will appear at the beginning of
the ``LSM: initializing`` log line as well, even if they are not configured in
the boot loader.

> +``lockdown,capability,`` may always stay at the beginning of the ``LSM:
> +initializing lsm=`` list even if they are not configured with the bootloader,

Nit: The man pages spell this in two words as "boot loader".


> +which is OK.
> +
> +Network support
> +---------------
> +
> To be able to explicitly allow TCP operations (e.g., adding a network rule with
> ``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
> (``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an
>
> base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
> --
> 2.44.0
>

Reviewed-by: Günther Noack <[email protected]>

2024-03-07 10:23:16

by Mickaël Salaün

[permalink] [raw]
Subject: Re: [PATCH v2 1/2] landlock: Extend documentation for kernel support

CCing Alejandro

On Tue, Feb 27, 2024 at 05:32:20PM +0100, Günther Noack wrote:
> On Tue, Feb 27, 2024 at 12:05:49PM +0100, Mickaël Salaün wrote:
> > Extend the kernel support section with one subsection for build time
> > configuration and another for boot time configuration.
> >
> > Extend the boot time subsection with a concrete example.
> >
> > Update the journalctl command to include the boot option.
> >
> > Cc: Günther Noack <[email protected]>
> > Cc: Kees Cook <[email protected]>
> > Signed-off-by: Mickaël Salaün <[email protected]>
> > ---
> >
> > Changes since v1:
> > * New patch, suggested by Kees Cook.
> > ---
> > Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
> > 1 file changed, 51 insertions(+), 6 deletions(-)
> >
> > diff --git a/Documentation/userspace-api/landlock.rst b/Documentation/userspace-api/landlock.rst
> > index 2e3822677061..838cc27db232 100644
> > --- a/Documentation/userspace-api/landlock.rst
> > +++ b/Documentation/userspace-api/landlock.rst
> > +Boot time configuration
> > +-----------------------
> > +
> > If the running kernel does not have ``landlock`` in ``CONFIG_LSM``, then we can
> > -still enable it by adding ``lsm=landlock,[...]`` to
> > +enable Landlock by adding ``lsm=landlock,[...]`` to
> > Documentation/admin-guide/kernel-parameters.rst thanks to the bootloader
> > configuration.
>
> I would suggest: s/thanks to/in/

OK

>
> > +For example, if the current built-in configuration is:
> > +
> > +.. code-block:: console
> > +
> > + $ zgrep -h "^CONFIG_LSM=" "/boot/config-$(uname -r)" /proc/config.gz 2>/dev/null
> > + CONFIG_LSM="lockdown,yama,integrity,apparmor"
> > +
> > +...and if the cmdline doesn't contain ``landlock`` either:
> > +
> > +.. code-block:: console
> > +
> > + $ sed -n 's/.*\(\<lsm=\S\+\).*/\1/p' /proc/cmdline
> > + lsm=lockdown,yama,integrity,apparmor
> > +
> > +...we should configure the bootloader to set a cmdline extending the ``lsm``
> > +list with the ``landlock,`` prefix::
>
> Nit: Is the double colon at the end of this line accidental?
> (It does not appear before the previous code block.)

The "::" creates an implicit text block with the following text. For the
other block I used an explicit code-block, which then doesn't require
this "::".

>
> > +
> > + lsm=landlock,lockdown,yama,integrity,apparmor
> > +
> > +After a reboot, we can check that Landlock is up and running by looking at
> > +kernel logs:
> > +
> > +.. code-block:: console
> > +
> > + # dmesg | grep landlock || journalctl -kb -g landlock
> > + [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > + [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > + [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
> > + [ 0.000000] landlock: Up and running.
> > +
> > +Note that according to the built time kernel configuration,
>
> s/built time/build time/
> ^

OK

>
> It feels like the phrase "according to" could be slightly more specific here.
>
> To paraphrase Alejandro Colomar, "Note that" is usually redundant.
> https://lore.kernel.org/all/[email protected]/
>
> I'd suggest:
>
> The kernel may be configured at build time to always load the ``lockdown`` and
> ``capability`` LSMs. In that case, these LSMs will appear at the beginning of
> the ``LSM: initializing`` log line as well, even if they are not configured in
> the boot loader.

OK, I integrated your suggestion. I guess `capability` is not really
considered an LSM but it would be too confusing and out of scope for an
user documentation to explain that.

>
> > +``lockdown,capability,`` may always stay at the beginning of the ``LSM:
> > +initializing lsm=`` list even if they are not configured with the bootloader,
>
> Nit: The man pages spell this in two words as "boot loader".

OK, I'll use "boot loader" too.

>
>
> > +which is OK.
> > +
> > +Network support
> > +---------------
> > +
> > To be able to explicitly allow TCP operations (e.g., adding a network rule with
> > ``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
> > (``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an
> >
> > base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
> > --
> > 2.44.0
> >
>
> Reviewed-by: Günther Noack <[email protected]>

Thanks!

2024-03-18 09:52:08

by Alejandro Colomar

[permalink] [raw]
Subject: Re: [PATCH v2 1/2] landlock: Extend documentation for kernel support

Hi Mickaël, Günther,

Sorry for the delay!

On Thu, Mar 07, 2024 at 11:21:57AM +0100, Mickaël Salaün wrote:
> CCing Alejandro
>
> On Tue, Feb 27, 2024 at 05:32:20PM +0100, Günther Noack wrote:
> > On Tue, Feb 27, 2024 at 12:05:49PM +0100, Mickaël Salaün wrote:
> > > Extend the kernel support section with one subsection for build time
> > > configuration and another for boot time configuration.
> > >
> > > Extend the boot time subsection with a concrete example.
> > >
> > > Update the journalctl command to include the boot option.
> > >
> > > Cc: Günther Noack <[email protected]>
> > > Cc: Kees Cook <[email protected]>
> > > Signed-off-by: Mickaël Salaün <[email protected]>
> > > ---
> > >
> > > Changes since v1:
> > > * New patch, suggested by Kees Cook.
> > > ---
> > > Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
> > > 1 file changed, 51 insertions(+), 6 deletions(-)

[...]

> > > +
> > > + lsm=landlock,lockdown,yama,integrity,apparmor
> > > +
> > > +After a reboot, we can check that Landlock is up and running by looking at
> > > +kernel logs:
> > > +
> > > +.. code-block:: console
> > > +
> > > + # dmesg | grep landlock || journalctl -kb -g landlock
> > > + [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > + [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > + [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
> > > + [ 0.000000] landlock: Up and running.
> > > +
> > > +Note that according to the built time kernel configuration,
> >
> > s/built time/build time/
> > ^
>
> OK

Here, this should actually be "build-time" since it works as an
adjective.

>
> >
> > It feels like the phrase "according to" could be slightly more specific here.
> >
> > To paraphrase Alejandro Colomar, "Note that" is usually redundant.
> > https://lore.kernel.org/all/[email protected]/
> >
> > I'd suggest:
> >
> > The kernel may be configured at build time to always load the ``lockdown`` and
> > ``capability`` LSMs. In that case, these LSMs will appear at the beginning of
> > the ``LSM: initializing`` log line as well, even if they are not configured in
> > the boot loader.

LGTM

>
> OK, I integrated your suggestion. I guess `capability` is not really
> considered an LSM but it would be too confusing and out of scope for an
> user documentation to explain that.
>
> >
> > > +``lockdown,capability,`` may always stay at the beginning of the ``LSM:
> > > +initializing lsm=`` list even if they are not configured with the bootloader,
> >
> > Nit: The man pages spell this in two words as "boot loader".
>
> OK, I'll use "boot loader" too.
>
> >
> >
> > > +which is OK.
> > > +
> > > +Network support
> > > +---------------
> > > +
> > > To be able to explicitly allow TCP operations (e.g., adding a network rule with
> > > ``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
> > > (``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an
> > >
> > > base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
> > > --
> > > 2.44.0
> > >
> >
> > Reviewed-by: Günther Noack <[email protected]>
>
> Thanks!

Reviewed-by: Alejandro Colomar <[email protected]>

Have a lovely day!
Alex

--
<https://www.alejandro-colomar.es/>
Looking for a remote C programming job at the moment.


Attachments:
(No filename) (3.49 kB)
signature.asc (849.00 B)
Download all attachments

2024-03-19 10:56:57

by Mickaël Salaün

[permalink] [raw]
Subject: Re: [PATCH v2 1/2] landlock: Extend documentation for kernel support

On Mon, Mar 18, 2024 at 10:50:42AM +0100, Alejandro Colomar wrote:
> Hi Mickaël, Günther,
>
> Sorry for the delay!
>
> On Thu, Mar 07, 2024 at 11:21:57AM +0100, Mickaël Salaün wrote:
> > CCing Alejandro
> >
> > On Tue, Feb 27, 2024 at 05:32:20PM +0100, Günther Noack wrote:
> > > On Tue, Feb 27, 2024 at 12:05:49PM +0100, Mickaël Salaün wrote:
> > > > Extend the kernel support section with one subsection for build time
> > > > configuration and another for boot time configuration.
> > > >
> > > > Extend the boot time subsection with a concrete example.
> > > >
> > > > Update the journalctl command to include the boot option.
> > > >
> > > > Cc: Günther Noack <[email protected]>
> > > > Cc: Kees Cook <[email protected]>
> > > > Signed-off-by: Mickaël Salaün <[email protected]>
> > > > ---
> > > >
> > > > Changes since v1:
> > > > * New patch, suggested by Kees Cook.
> > > > ---
> > > > Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
> > > > 1 file changed, 51 insertions(+), 6 deletions(-)
>
> [...]
>
> > > > +
> > > > + lsm=landlock,lockdown,yama,integrity,apparmor
> > > > +
> > > > +After a reboot, we can check that Landlock is up and running by looking at
> > > > +kernel logs:
> > > > +
> > > > +.. code-block:: console
> > > > +
> > > > + # dmesg | grep landlock || journalctl -kb -g landlock
> > > > + [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > > + [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > > + [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
> > > > + [ 0.000000] landlock: Up and running.
> > > > +
> > > > +Note that according to the built time kernel configuration,
> > >
> > > s/built time/build time/
> > > ^
> >
> > OK
>
> Here, this should actually be "build-time" since it works as an
> adjective.

Thanks Alex but this was already merged:
https://git.kernel.org/torvalds/c/35e886e88c803920644c9d3abb45a9ecb7f1e761

Because I picked Günther's below suggestion, it should be good right?

>
> >
> > >
> > > It feels like the phrase "according to" could be slightly more specific here.
> > >
> > > To paraphrase Alejandro Colomar, "Note that" is usually redundant.
> > > https://lore.kernel.org/all/[email protected]/
> > >
> > > I'd suggest:
> > >
> > > The kernel may be configured at build time to always load the ``lockdown`` and
> > > ``capability`` LSMs. In that case, these LSMs will appear at the beginning of
> > > the ``LSM: initializing`` log line as well, even if they are not configured in
> > > the boot loader.
>
> LGTM
>
> >
> > OK, I integrated your suggestion. I guess `capability` is not really
> > considered an LSM but it would be too confusing and out of scope for an
> > user documentation to explain that.
> >
> > >
> > > > +``lockdown,capability,`` may always stay at the beginning of the ``LSM:
> > > > +initializing lsm=`` list even if they are not configured with the bootloader,
> > >
> > > Nit: The man pages spell this in two words as "boot loader".
> >
> > OK, I'll use "boot loader" too.
> >
> > >
> > >
> > > > +which is OK.
> > > > +
> > > > +Network support
> > > > +---------------
> > > > +
> > > > To be able to explicitly allow TCP operations (e.g., adding a network rule with
> > > > ``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
> > > > (``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an
> > > >
> > > > base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
> > > > --
> > > > 2.44.0
> > > >
> > >
> > > Reviewed-by: Günther Noack <[email protected]>
> >
> > Thanks!
>
> Reviewed-by: Alejandro Colomar <[email protected]>
>
> Have a lovely day!
> Alex
>
> --
> <https://www.alejandro-colomar.es/>
> Looking for a remote C programming job at the moment.



2024-03-19 11:40:32

by Alejandro Colomar

[permalink] [raw]
Subject: Re: [PATCH v2 1/2] landlock: Extend documentation for kernel support

Hi Mickaël!

On Tue, Mar 19, 2024 at 11:46:34AM +0100, Mickaël Salaün wrote:
> On Mon, Mar 18, 2024 at 10:50:42AM +0100, Alejandro Colomar wrote:
> > Hi Mickaël, Günther,
> >
> > Sorry for the delay!
> >
> > On Thu, Mar 07, 2024 at 11:21:57AM +0100, Mickaël Salaün wrote:
> > > CCing Alejandro
> > >
> > > On Tue, Feb 27, 2024 at 05:32:20PM +0100, Günther Noack wrote:
> > > > On Tue, Feb 27, 2024 at 12:05:49PM +0100, Mickaël Salaün wrote:
> > > > > Extend the kernel support section with one subsection for build time
> > > > > configuration and another for boot time configuration.
> > > > >
> > > > > Extend the boot time subsection with a concrete example.
> > > > >
> > > > > Update the journalctl command to include the boot option.
> > > > >
> > > > > Cc: Günther Noack <[email protected]>
> > > > > Cc: Kees Cook <[email protected]>
> > > > > Signed-off-by: Mickaël Salaün <[email protected]>
> > > > > ---
> > > > >
> > > > > Changes since v1:
> > > > > * New patch, suggested by Kees Cook.
> > > > > ---
> > > > > Documentation/userspace-api/landlock.rst | 57 +++++++++++++++++++++---
> > > > > 1 file changed, 51 insertions(+), 6 deletions(-)
> >
> > [...]
> >
> > > > > +
> > > > > + lsm=landlock,lockdown,yama,integrity,apparmor
> > > > > +
> > > > > +After a reboot, we can check that Landlock is up and running by looking at
> > > > > +kernel logs:
> > > > > +
> > > > > +.. code-block:: console
> > > > > +
> > > > > + # dmesg | grep landlock || journalctl -kb -g landlock
> > > > > + [ 0.000000] Command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > > > + [ 0.000000] Kernel command line: [...] lsm=landlock,lockdown,yama,integrity,apparmor
> > > > > + [ 0.000000] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor
> > > > > + [ 0.000000] landlock: Up and running.
> > > > > +
> > > > > +Note that according to the built time kernel configuration,
> > > >
> > > > s/built time/build time/
> > > > ^
> > >
> > > OK
> >
> > Here, this should actually be "build-time" since it works as an
> > adjective.
>
> Thanks Alex but this was already merged:
> https://git.kernel.org/torvalds/c/35e886e88c803920644c9d3abb45a9ecb7f1e761
>
> Because I picked Günther's below suggestion, it should be good right?

Yeah, it's a minor grammar mistake that is widespread elsewhere. If you
want to patch it, go ahead, if you want to keep it until next time you
revise this text, it's not something that will significantly hurt the
understanding of the text.

See also: <https://www.grammar-monster.com/lessons/hyphens_in_compound_adjectives.htm>

Have a lovely day!
Alex

>
> >
> > >
> > > >
> > > > It feels like the phrase "according to" could be slightly more specific here.
> > > >
> > > > To paraphrase Alejandro Colomar, "Note that" is usually redundant.
> > > > https://lore.kernel.org/all/[email protected]/
> > > >
> > > > I'd suggest:
> > > >
> > > > The kernel may be configured at build time to always load the ``lockdown`` and
> > > > ``capability`` LSMs. In that case, these LSMs will appear at the beginning of
> > > > the ``LSM: initializing`` log line as well, even if they are not configured in
> > > > the boot loader.
> >
> > LGTM
> >
> > >
> > > OK, I integrated your suggestion. I guess `capability` is not really
> > > considered an LSM but it would be too confusing and out of scope for an
> > > user documentation to explain that.
> > >
> > > >
> > > > > +``lockdown,capability,`` may always stay at the beginning of the ``LSM:
> > > > > +initializing lsm=`` list even if they are not configured with the bootloader,
> > > >
> > > > Nit: The man pages spell this in two words as "boot loader".
> > >
> > > OK, I'll use "boot loader" too.
> > >
> > > >
> > > >
> > > > > +which is OK.
> > > > > +
> > > > > +Network support
> > > > > +---------------
> > > > > +
> > > > > To be able to explicitly allow TCP operations (e.g., adding a network rule with
> > > > > ``LANDLOCK_ACCESS_NET_BIND_TCP``), the kernel must support TCP
> > > > > (``CONFIG_INET=y``). Otherwise, sys_landlock_add_rule() returns an
> > > > >
> > > > > base-commit: b4007fd27206c478a4b76e299bddf4a71787f520
> > > > > --
> > > > > 2.44.0
> > > > >
> > > >
> > > > Reviewed-by: Günther Noack <[email protected]>
> > >
> > > Thanks!
> >
> > Reviewed-by: Alejandro Colomar <[email protected]>
> >
> > Have a lovely day!
> > Alex
> >
> > --
> > <https://www.alejandro-colomar.es/>
> > Looking for a remote C programming job at the moment.
>
>

--
<https://www.alejandro-colomar.es/>
Looking for a remote C programming job at the moment.


Attachments:
(No filename) (4.74 kB)
signature.asc (849.00 B)
Download all attachments