[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a4dc7c12-b485-2eb2-add5-4f7a387a50fa@digikod.net>
Date: Thu, 20 Apr 2023 19:40:44 +0200
From: Mickaël Salaün <mic@...ikod.net>
To: xiujianfeng <xiujianfeng@...wei.com>, paul@...l-moore.com,
jmorris@...ei.org, serge@...lyn.com, shuah@...nel.org,
corbet@....net
Cc: linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org,
linux-doc@...r.kernel.org, roberto.sassu@...wei.com,
Konstantin Meskhidze <konstantin.meskhidze@...wei.com>
Subject: Re: [PATCH -next v2 0/6] landlock: add chmod and chown support
On 18/04/2023 12:53, xiujianfeng wrote:
> Hi Mickael,
>
> Sorry about the long silence on this work, As we known this work depends
> on another work about changing argument from struct dentry to struct
> path for some attr/xattr related lsm hooks, I'm stuck with this thing,
> because IMA/EVM is a special security module which is not LSM-based
> currently, and severely coupled with the file system. so I am waiting
> for Roberto Sassu' work (Move IMA and EVM to the LSM infrastructure) to
> be ready, I think it can make my work more easy. you can find
> Roberto'work here,
> https://lwn.net/ml/linux-kernel/20230303181842.1087717-1-roberto.sassu@huaweicloud.com/
>
> Any good idea are welcome, thanks.
Thanks for the update Xiu.
Which part would be needed from Roberto's patch series?
>
>
> On 2022/8/27 19:12, Xiu Jianfeng wrote:
>> v2:
>> * abstract walk_to_visible_parent() helper
>> * chmod and chown rights only take affect on directory's context
>> * add testcase for fchmodat/lchown/fchownat
>> * fix other review issues
>>
>> Xiu Jianfeng (6):
>> landlock: expand access_mask_t to u32 type
>> landlock: abstract walk_to_visible_parent() helper
>> landlock: add chmod and chown support
>> landlock/selftests: add selftests for chmod and chown
>> landlock/samples: add chmod and chown support
>> landlock: update chmod and chown support in document
>>
>> Documentation/userspace-api/landlock.rst | 9 +-
>> include/uapi/linux/landlock.h | 10 +-
>> samples/landlock/sandboxer.c | 13 +-
>> security/landlock/fs.c | 110 ++++++--
>> security/landlock/limits.h | 2 +-
>> security/landlock/ruleset.h | 2 +-
>> security/landlock/syscalls.c | 2 +-
>> tools/testing/selftests/landlock/base_test.c | 2 +-
>> tools/testing/selftests/landlock/fs_test.c | 267 ++++++++++++++++++-
>> 9 files changed, 386 insertions(+), 31 deletions(-)
>>
Powered by blists - more mailing lists