Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp104321pxb; Wed, 11 Nov 2020 21:43:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJw2B/Bl4BqOZ0oVBW3lC/1X4gbLanUNbwebXBUsw5PY+0vgEkY3pw2Q4Eh5xOsAaXeeCDXD X-Received: by 2002:a05:6402:cb4:: with SMTP id cn20mr3490480edb.186.1605159796190; Wed, 11 Nov 2020 21:43:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605159796; cv=none; d=google.com; s=arc-20160816; b=h+P83Qdsuboj9HWIb6+X7TaY4ZXT1gk6KkO2eagUh9EyWuAU6QVR7U/cmfiaX3ZtwE n90vt7StbLaUBLQfJhxxfpkN2W9MaAHRetXHuPvQQr1KN/t+pyjDaxTJPnFV2CysPySD A9ZaopM9InCWyjT0mph69qxcV7iDbO/ais4Qrq5qjmUvNZ+zEYyo64jVsHZQHCUgW/S+ 6ITFmyY3GopCHtlu6aJvx3YpFCqAz2tednoyWpsYFWP7LpJEa/EamNLuY+v1nX6SwYeq YXU5p3/0rw3fKe4Lkj09Nq5F5tiOPbI7AP048tyfJgNK6kqGiP837ySx6d6wR5Oi+htT t0KA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date; bh=Apecx9KcSOgrtbaas7/xPY1CDAcXFsaX7cvlqbJr8Xw=; b=aMGY4AX6LMz2KHYZ2Q0JYJcW8GMWivSVS8bM8Vi4IrwG5fxmfPiUeTontEFYvkExXF Rk9kGljEDnNKj/rfMBRGx7sRm4OAXTBk3Z4OjPkrFlJTQsxXtqCBa15CixW/b8W17N+n PT64W/JV3ziWvfcxpzUAQ+lXDM/vdZ+O+liga6ARSsrDWuAGDOJYh4UOQp7tVOb99yRR qcgIerFelCI5pXhQ2TwmxZqaHAzYFXPVAakJA8paHGfVkWVmeVz4ucUrZn+zrW6v8mmX 3y4Pvn4FDovBn4cYOHwqGKP6FW+RyHg2tyOL5np9AIKx0CPDK1uhCD6xkVkTiMT9ALXj w8eg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z34si3523062ede.351.2020.11.11.21.42.52; Wed, 11 Nov 2020 21:43:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729494AbgKLFio (ORCPT + 99 others); Thu, 12 Nov 2020 00:38:44 -0500 Received: from namei.org ([65.99.196.166]:52612 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729185AbgKLFAH (ORCPT ); Thu, 12 Nov 2020 00:00:07 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 0AC4xj4d005412; Thu, 12 Nov 2020 04:59:45 GMT Date: Thu, 12 Nov 2020 15:59:45 +1100 (AEDT) From: James Morris To: =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= cc: Jann Horn , "Serge E . Hallyn" , Shuah Khan , Vincent Dagonneau , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v1 0/9] Landlock fixes In-Reply-To: <20201111213442.434639-1-mic@digikod.net> Message-ID: References: <20201111213442.434639-1-mic@digikod.net> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="1665246916-1592972126-1605157185=:5257" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-1592972126-1605157185=:5257 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT On Wed, 11 Nov 2020, Mickaël Salaün wrote: > Hi, > > This patch series fixes some issues and makes the Landlock filesystem > access-control more consistent and deterministic when stacking multiple > rulesets. This is checked by current and new tests. I also extended > documentation and example to help users. > > This series can be applied on top of > https://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git/log/?h=landlock_lsm Actually, given the number of fixes here, please respin so we get a cleaner initial PR for Linus. > > Regards, > > Mickaël Salaün (9): > landlock: Fix memory allocation error handling > landlock: Cosmetic fixes for filesystem management > landlock: Enforce deterministic interleaved path rules > landlock: Always intersect access rights > landlock: Add extra checks when inserting a rule > selftests/landlock: Extend layout1.inherit_superset > landlock: Clean up get_ruleset_from_fd() > landlock: Add help to enable Landlock as a stacked LSM > landlock: Extend documentation about limitations > > Documentation/userspace-api/landlock.rst | 17 +++ > samples/landlock/sandboxer.c | 21 +++- > security/landlock/Kconfig | 4 +- > security/landlock/fs.c | 67 +++++----- > security/landlock/object.c | 5 +- > security/landlock/ruleset.c | 34 ++--- > security/landlock/syscall.c | 24 ++-- > tools/testing/selftests/landlock/fs_test.c | 140 +++++++++++++++++++-- > 8 files changed, 239 insertions(+), 73 deletions(-) > > > base-commit: 96b3198c4025c11347651700b77e45a686d78553 > -- James Morris --1665246916-1592972126-1605157185=:5257--