Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp509704ybh; Sat, 18 Jul 2020 10:51:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx7JEICLENhvmXCuE54Gk0PFnRzeApw5p8U0uJQm9lYzTlo6Wsme36AW6b3MllqXuNgsuGr X-Received: by 2002:a17:906:fb99:: with SMTP id lr25mr13757373ejb.49.1595094670126; Sat, 18 Jul 2020 10:51:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595094670; cv=none; d=google.com; s=arc-20160816; b=DKUYSgmgDvmbuUcc1IdS8xaff3+CGviY1+P1RtitjhWX2HGnGxvY4bEHl2PK/ixxsu 1HCXkwbKEMq14B5GeO3PA4LH2CZtTYAzGb1fGaPCbaETHEL1QgC0nqQl5tpWjEjEc4Fo 5o+qW3gMyseWmLZMD6gXyhXNx9gooo2GoJahBZpaaPRWvOArT08+9ZeGKtIztCnleNuO Q1z8D09u6DJUc3Ku0q2Jy8T8QZLGPZmqvw9lGrkHi5/zJgqCQz1uqo5F2XpayOOUWwSZ 2VjFDc2XZUWFeHp4XoWx15+GNFVqHhE+XmW1CXt+vTVXkjf41weLfzUUNNixUTN1xCT+ wf2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=55jrdlujoYoIqrCpjKjUSpHASlMtvEoyuy22sNofdEI=; b=wQpAlnf9CP0TC5PSVbPCkMDg30GnI2WnhUn5t0ztDwXqusHOjWyrNeUEmQrx44KgHe au0jvnD2QTrVeEKIod7DN2TZR62OonkTGH73TvAMeRHByOM4VZFv3vd4SUtUE9nMY6Ul waRfc+Fi5qiBDa4MI6pNLVf+iAUdfle1fHC72ADIeVLhXKh285S7s9/EDEIpeu/KtdYm 8yZKjCCHpTYysSB4UPhhi+TmSSVKznSsnm3TPP3/VbeXDza7j6YKGVWLiWgWOLroDpOG uNtA3+yZnMEEqwVu/RYMpxLLg3uLVKRC7GsgDavDUkg21C4kefZcbHisLzEEp2bBhiFp VeBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lj8si7308230ejb.60.2020.07.18.10.50.45; Sat, 18 Jul 2020 10:51:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727876AbgGRRsN (ORCPT + 99 others); Sat, 18 Jul 2020 13:48:13 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:41694 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726155AbgGRRsM (ORCPT ); Sat, 18 Jul 2020 13:48:12 -0400 Received: from ip5f5af08c.dynamic.kabel-deutschland.de ([95.90.240.140] helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jwqw0-0003uS-Rf; Sat, 18 Jul 2020 17:47:40 +0000 Date: Sat, 18 Jul 2020 19:47:39 +0200 From: Christian Brauner To: "Serge E. Hallyn" , Adrian Reber , Nicolas Viennot Cc: Adrian Reber , Eric Biederman , Pavel Emelyanov , Oleg Nesterov , Dmitry Safonov <0x7f454c46@gmail.com>, Andrei Vagin , =?utf-8?B?TWljaGHFgiBDxYJhcGnFhHNraQ==?= , Kamil Yurtsever , Dirk Petersen , Christine Flood , Casey Schaufler , Mike Rapoport , Radostin Stoyanov , Cyrill Gorcunov , Stephen Smalley , Sargun Dhillon , Arnd Bergmann , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, selinux@vger.kernel.org, Eric Paris , Jann Horn , linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE Message-ID: <20200718174739.bg73idrihaj4p2qf@wittgenstein> References: <20200715144954.1387760-1-areber@redhat.com> <20200718032416.GC11982@mail.hallyn.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200718032416.GC11982@mail.hallyn.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 17, 2020 at 10:24:16PM -0500, Serge Hallyn wrote: > On Wed, Jul 15, 2020 at 04:49:48PM +0200, Adrian Reber wrote: > > This is v5 of the 'Introduce CAP_CHECKPOINT_RESTORE' patchset. The > > changes to v4 are: > > > > * split into more patches to have the introduction of > > CAP_CHECKPOINT_RESTORE and the actual usage in different > > patches > > * reduce the /proc/self/exe patch to only be about > > CAP_CHECKPOINT_RESTORE > > > > Adrian Reber (5): > > capabilities: Introduce CAP_CHECKPOINT_RESTORE > > pid: use checkpoint_restore_ns_capable() for set_tid > > pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid > > proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE > > selftests: add clone3() CAP_CHECKPOINT_RESTORE test > > > > Nicolas Viennot (1): > > prctl: Allow checkpoint/restore capable processes to change exe link > > (This is probably bad form, but) All > > Reviewed-by: Serge Hallyn > > Assuming you changes patches 4 and 6 per Christian's suggestions, > I'd like to re-review those then. Thanks, once Adrian has reposted the changes and you agree with them as well, I'll pick them up though I might end up pushing this into the next merge window... Christian