Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp1922243lql; Wed, 13 Mar 2024 11:56:49 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVbTc8ad90+j7eucTBfrt7ULNvY6a/Gw0FpQbNZR06ZCqoyvXaQiWE4i6oEu0hNkJIPP4jqZ9pfDENy1HrkhiyNqvRHc28XhoZl4J7ULA== X-Google-Smtp-Source: AGHT+IF6YGkdH0W1fKFqvJ/07OMOxaaMoKgWzRiZkMU8GwWSsZwi5NK3/qi8elb6cy1EoLisU1Bc X-Received: by 2002:a50:ab48:0:b0:566:825b:98 with SMTP id t8-20020a50ab48000000b00566825b0098mr3192408edc.6.1710356209517; Wed, 13 Mar 2024 11:56:49 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710356209; cv=pass; d=google.com; s=arc-20160816; b=mkRUCySu9yp8dscSssH7coz4iYMKG+V9kl/cJ/LyB4RABfUT7pRQXS2Wb1T0pVEZCG YV3p+5fWlXAFmzzANfrSbnjXqZOMJppUzJzGbPrAa/8Urom/xGh9GpluCPZWw1DNiA9T +Vn0fAGxwE1JLUbMORo1tc/SLYF6VXntVCiJKUqbt06kidx8CjyUYeS4xSWRwjeLE2Fa nc0H0rqMl5QhhDur/P7NYf4dN6Vof6ZrdJ7NOmxjVjGcmeYDpDDawXyXdzfk0xfb3crp VuZ7V3f9yoI0T1pvhvKUbD55tcmqEN85Kk3ngSAj9KHVuV2NAfHVEqz6GwdVg3ST6XVn N+9g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=jBOy19bLPy7pTjj4o0zp3Sics74oaUfalBxF08pNhsc=; fh=tNVdgP5I3AXBWbpmeaeJ8uGwINT1ZCByBgzV0M3EFf4=; b=qhRRycY0MplsZSCxJc8EhI+ApHbQ2epin8lU3+hcBRojESKS1ZC6+pQ9Lag5zRPavJ 63DJbexHu8zr611DZgLjofxOzyM6WpS995ox/u5MdfOZ6Ot248c0XpxUAAEnkVk7pSZl oAUp9Nn3M9M4QAhzkez95g6NRCsze7BWlGi0UA90HSMwcKcNi3/zO/63GP6jVX7ja2WF VTODawtvLWgSjIvKdWm5LK3fnkXc8rBrSG6AFOLcxDMwscLM/VixjBrlhGUG8enoFPQD P87kU3m3qN2azxvNVpHa1Z0jDwjjepO4cRc1RQbm4Fb6HhQLkPfNO5Q8ZItJsZlDJpKd bocw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=EvlyIkRZ; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-102316-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-102316-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id s9-20020a056402520900b00568411e757bsi4451041edd.30.2024.03.13.11.56.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Mar 2024 11:56:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-102316-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=EvlyIkRZ; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-102316-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-102316-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 487041F2B230 for ; Wed, 13 Mar 2024 18:55:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 61DA913D305; Wed, 13 Mar 2024 17:53:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b="EvlyIkRZ" Received: from smtp-bc0a.mail.infomaniak.ch (smtp-bc0a.mail.infomaniak.ch [45.157.188.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4E69458106 for ; Wed, 13 Mar 2024 17:53:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.157.188.10 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710352406; cv=none; b=Ie45ubnLug5UtBPgnEvxKbWMwFyCl7+VR0lwkmqvEqESRA8/ULcmbmOTeTiLaFy8syd85Zat3PQn1o1nhQamVrQWPrgraokp3W+rBFiTL2bXAhF1V38SweADGGGMA5bZRHS2w4V3S/GXzZiORrHkDaCVCjtWI4yLxjsgzx1Hl7w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710352406; c=relaxed/simple; bh=cjAAAgrdcj01UDL3qSNxp3FlfnIKOm6Fuw930OMcsTo=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=F7Mzwv3WfvDApiLabxwMsB+Jsmz6Dz+h6afzdAU/9i58csiRRCX6ZzXEV+6JWz2wCp6XwgWIXrFzOpZYw2UJMepc8kexXaCreUUdjfKQ8Q68X+8EV+LffRKu0WImjAueIeg66rKkqj0w4fPVnLf/+0NuVxgyjQWB9PL53NvzNl8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net; spf=pass smtp.mailfrom=digikod.net; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b=EvlyIkRZ; arc=none smtp.client-ip=45.157.188.10 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=digikod.net Received: from smtp-3-0001.mail.infomaniak.ch (unknown [10.4.36.108]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4Tvym66BGjzMq1pr; Wed, 13 Mar 2024 18:53:10 +0100 (CET) Received: from unknown by smtp-3-0001.mail.infomaniak.ch (Postfix) with ESMTPA id 4Tvym62qPPzMpnPs; Wed, 13 Mar 2024 18:53:10 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digikod.net; s=20191114; t=1710352390; bh=cjAAAgrdcj01UDL3qSNxp3FlfnIKOm6Fuw930OMcsTo=; h=From:To:Cc:Subject:Date:From; b=EvlyIkRZp0XmRSS2jfT7iBc8+VUARDsBxMOB+pPAstXzYQVFKy377Z2lUOMKlhO0w wmROy8+266HoGQV3IW6CBHOyym3SrIdVJKMK+kUstbGHs1yYBJ1xFiz8N+ZpQXFzoz A854nEWkehI3sMO+h/N8VClZE9BySepTzw72TZVc= From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Linus Torvalds Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , =?UTF-8?q?G=C3=BCnther=20Noack?= , Paul Moore , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [GIT PULL] Landlock updates for v6.9 Date: Wed, 13 Mar 2024 18:53:07 +0100 Message-ID: <20240313175307.714251-1-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha Hi Linus, This PR brings some miscellaneous improvements, including new KUnit tests, extended documentation and boot help, and some cosmetic cleanups. Additional test changes already went through the net tree. Please pull these changes for v6.9-rc1. This commit merged cleanly with your master branch. The kernel code has been tested in the latest linux-next releases for a few weeks. Regards, Mickaël -- The following changes since commit d9818b3e906a0ee1ab02ea79e74a2f755fc5461a: landlock: Fix asymmetric private inodes referring (2024-02-26 18:23:53 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux.git tags/landlock-6.9-rc1 for you to fetch changes up to a17c60e533f5cd832e77e0d194e2e0bb663371b6: samples/landlock: Don't error out if a file path cannot be opened (2024-03-08 18:22:18 +0100) ---------------------------------------------------------------- Landlock updates for v6.9-rc1 ---------------------------------------------------------------- Mickaël Salaün (8): selftests/landlock: Clean up error logs related to capabilities landlock: Add support for KUnit tests landlock: Extend documentation for kernel support landlock: Warn once if a Landlock action is requested while disabled landlock: Simplify current_check_access_socket() landlock: Rename "ptrace" files to "task" landlock: Use f_cred in security_file_open() hook samples/landlock: Don't error out if a file path cannot be opened Documentation/userspace-api/landlock.rst | 59 ++++++- samples/landlock/sandboxer.c | 13 +- security/landlock/.kunitconfig | 4 + security/landlock/Kconfig | 15 ++ security/landlock/Makefile | 2 +- security/landlock/common.h | 2 + security/landlock/fs.c | 252 ++++++++++++++++++++++++++- security/landlock/net.c | 7 +- security/landlock/setup.c | 4 +- security/landlock/syscalls.c | 18 +- security/landlock/{ptrace.c => task.c} | 4 +- security/landlock/{ptrace.h => task.h} | 8 +- tools/testing/kunit/configs/all_tests.config | 1 + tools/testing/selftests/landlock/common.h | 39 +---- 14 files changed, 363 insertions(+), 65 deletions(-) create mode 100644 security/landlock/.kunitconfig rename security/landlock/{ptrace.c => task.c} (98%) rename security/landlock/{ptrace.h => task.h} (52%)