Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1015426ybk; Wed, 13 May 2020 20:40:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRieMXpWxfklFK5H14KBBNg6u7wslt/mPn1Vpr71q7+ou1hmkQ2vV25A033bq6KE4I3wbb X-Received: by 2002:a05:6402:3185:: with SMTP id di5mr2275691edb.330.1589427610296; Wed, 13 May 2020 20:40:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589427610; cv=none; d=google.com; s=arc-20160816; b=L3TVTs2qyYIIODGO2CXdw4AgHlwWz4DPI4XtLqFwKWiS9J/OCcrJ69qE90qMU3Ee7A VD8SoM7a7LrL7Wf/EhLFNvVPUEUeZpx6A8JSMJLhljLwZWTCw3/1ReVmMfvlEp34gKuO ZXo1TULAL9pBdlozXhP4h2nZyH2EYJc9RkDQowP76+CVKv49CNn+mouCSdzuw+j5vk56 OcsMO2TzV4PeLrmiJMYZIFe7Rug+lTqq2P++KSTU0C+lZnvb9mv+hNh6peP2/XgGO6W0 LOpxFMgmdgopZ4d4eektC+UbcgpbosH3uzeWeyMGsY7J+JqlweU8CHcwzfzZterZbOno lLew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=aCLnGB5bPz68Ar9ADxQpPlom+XNELUZ8qtX6pGHg1ys=; b=j3t4ianxY//RoLZA72gWr9i2IY+0/o8GQjfeUD8UPC0PnPlGVi/XSjObt1hUCE7sMA BbLV+EjakEx4PJIf5D8+V4w0WXE2anehK7N4VY5ufcPxEKS4EtNZElbrpUQG1cNoJCZN TRs9yZ7VXfEMBRg7Ly0j6ykOg5Ixqb1OcTWg9WmOqTjMP2hmrKipkK0BU52msUCnYceu 0ZUFenraTQvJrnF6ieKl6TtHRWzQGlV3NimYsNV0TDtqdO9pqgJE3h9cILY8fn2xxCqo ugX1Mmebtt4WVCtMwwa6NaGwqk9JZQzjNVpD7bV0//Y6LPYkdzVFgG2GhCATAh9zzrrM 9gpQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gu17si1075895ejb.26.2020.05.13.20.39.46; Wed, 13 May 2020 20:40:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726075AbgENDiV (ORCPT + 99 others); Wed, 13 May 2020 23:38:21 -0400 Received: from namei.org ([65.99.196.166]:58860 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725925AbgENDiU (ORCPT ); Wed, 13 May 2020 23:38:20 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 04E3bnC3001625; Thu, 14 May 2020 03:37:49 GMT Date: Thu, 14 May 2020 13:37:49 +1000 (AEST) From: James Morris To: =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= cc: linux-kernel@vger.kernel.org, Al Viro , Andy Lutomirski , Arnd Bergmann , Casey Schaufler , Jann Horn , Jonathan Corbet , Kees Cook , Michael Kerrisk , =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= , "Serge E . Hallyn" , Shuah Khan , Vincent Dagonneau , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-security-module@vger.kernel.org, x86@kernel.org Subject: Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control In-Reply-To: <20200511192156.1618284-6-mic@digikod.net> Message-ID: References: <20200511192156.1618284-1-mic@digikod.net> <20200511192156.1618284-6-mic@digikod.net> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="1665246916-1014880157-1589427470=:30052" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-1014880157-1589427470=:30052 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT On Mon, 11 May 2020, Mickaël Salaün wrote: > diff --git a/include/linux/fs.h b/include/linux/fs.h > index 45cc10cdf6dd..2276642f8e05 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -1517,6 +1517,11 @@ struct super_block { > /* Pending fsnotify inode refs */ > atomic_long_t s_fsnotify_inode_refs; > > +#ifdef CONFIG_SECURITY_LANDLOCK > + /* References to Landlock underlying objects */ > + atomic_long_t s_landlock_inode_refs; > +#endif > + This needs to be converted to the LSM API via superblock blob stacking. See Casey's old patch: https://lore.kernel.org/linux-security-module/20190829232935.7099-2-casey@schaufler-ca.com/ -- James Morris --1665246916-1014880157-1589427470=:30052--