mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 00:48:50 +00:00
17ae69aba8
-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEgycj0O+d1G2aycA8rZhLv9lQBTwFAmCInP4ACgkQrZhLv9lQ BTza0g//dTeb9woC9H7qlEhK4l9yk62lTss60Q8X7m7ZSNfdL4tiEbi64SgK+iOW OOegbrOEb8Kzh4KJJYmVlVZ5YUWyH4szgmee1wnylBdsWiWaPLPF3Cflz77apy6T TiiBsJd7rRE29FKheaMt34B41BMh8QHESN+DzjzJWsFoi/uNxjgSs2W16XuSupKu bpRmB1pYNXMlrkzz7taL05jndZYE5arVriqlxgAsuLOFOp/ER7zecrjImdCM/4kL W6ej0R1fz2Geh6CsLBJVE+bKWSQ82q5a4xZEkSYuQHXgZV5eywE5UKu8ssQcRgQA VmGUY5k73rfY9Ofupf2gCaf/JSJNXKO/8Xjg0zAdklKtmgFjtna5Tyg9I90j7zn+ 5swSpKuRpilN8MQH+6GWAnfqQlNoviTOpFeq3LwBtNVVOh08cOg6lko/bmebBC+R TeQPACKS0Q0gCDPm9RYoU1pMUuYgfOwVfVRZK1prgi2Co7ZBUMOvYbNoKYoPIydr ENBYljlU1OYwbzgR2nE+24fvhU8xdNOVG1xXYPAEHShu+p7dLIWRLhl8UCtRQpSR 1ofeVaJjgjrp29O+1OIQjB2kwCaRdfv/Gq1mztE/VlMU/r++E62OEzcH0aS+mnrg yzfyUdI8IFv1q6FGT9yNSifWUWxQPmOKuC8kXsKYfqfJsFwKmHM= =uCN4 -----END PGP SIGNATURE----- Merge tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security Pull Landlock LSM from James Morris: "Add Landlock, a new LSM from Mickaël Salaün. Briefly, Landlock provides for unprivileged application sandboxing. From Mickaël's cover letter: "The goal of Landlock is to enable to restrict ambient rights (e.g. global filesystem access) for a set of processes. Because Landlock is a stackable LSM [1], it makes possible to create safe security sandboxes as new security layers in addition to the existing system-wide access-controls. This kind of sandbox is expected to help mitigate the security impact of bugs or unexpected/malicious behaviors in user-space applications. Landlock empowers any process, including unprivileged ones, to securely restrict themselves. Landlock is inspired by seccomp-bpf but instead of filtering syscalls and their raw arguments, a Landlock rule can restrict the use of kernel objects like file hierarchies, according to the kernel semantic. Landlock also takes inspiration from other OS sandbox mechanisms: XNU Sandbox, FreeBSD Capsicum or OpenBSD Pledge/Unveil. In this current form, Landlock misses some access-control features. This enables to minimize this patch series and ease review. This series still addresses multiple use cases, especially with the combined use of seccomp-bpf: applications with built-in sandboxing, init systems, security sandbox tools and security-oriented APIs [2]" The cover letter and v34 posting is here: https://lore.kernel.org/linux-security-module/20210422154123.13086-1-mic@digikod.net/ See also: https://landlock.io/ This code has had extensive design discussion and review over several years" Link: https://lore.kernel.org/lkml/50db058a-7dde-441b-a7f9-f6837fe8b69f@schaufler-ca.com/ [1] Link: https://lore.kernel.org/lkml/f646e1c7-33cf-333f-070c-0a40ad0468cd@digikod.net/ [2] * tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: landlock: Enable user space to infer supported features landlock: Add user and kernel documentation samples/landlock: Add a sandbox manager example selftests/landlock: Add user space tests landlock: Add syscall implementations arch: Wire up Landlock syscalls fs,security: Add sb_delete hook landlock: Support filesystem access-control LSM: Infrastructure management of the superblock landlock: Add ptrace restrictions landlock: Set up the security framework and manage credentials landlock: Add ruleset and domain management landlock: Add object management |
||
---|---|---|
.. | ||
ptrace | ||
syscalls | ||
trace | ||
vdso32 | ||
vdso64 | ||
.gitignore | ||
align.c | ||
asm-offsets.c | ||
audit.c | ||
btext.c | ||
cacheinfo.c | ||
cacheinfo.h | ||
compat_audit.c | ||
cpu_setup_6xx.S | ||
cpu_setup_44x.S | ||
cpu_setup_fsl_booke.S | ||
cpu_setup_pa6t.S | ||
cpu_setup_power.c | ||
cpu_setup_ppc970.S | ||
cputable.c | ||
crash_dump.c | ||
dawr.c | ||
dbell.c | ||
dma-iommu.c | ||
dma-mask.c | ||
dma-swiotlb.c | ||
dt_cpu_ftrs.c | ||
early_32.c | ||
eeh.c | ||
eeh_cache.c | ||
eeh_driver.c | ||
eeh_event.c | ||
eeh_pe.c | ||
eeh_sysfs.c | ||
entry_32.S | ||
entry_64.S | ||
epapr_hcalls.S | ||
epapr_paravirt.c | ||
exceptions-64e.S | ||
exceptions-64s.S | ||
fadump.c | ||
firmware.c | ||
fpu.S | ||
fsl_booke_entry_mapping.S | ||
head_8xx.S | ||
head_32.h | ||
head_40x.S | ||
head_44x.S | ||
head_64.S | ||
head_book3s_32.S | ||
head_booke.h | ||
head_fsl_booke.S | ||
hw_breakpoint.c | ||
hw_breakpoint_constraints.c | ||
idle.c | ||
idle_6xx.S | ||
idle_book3e.S | ||
idle_book3s.S | ||
idle_e500.S | ||
ima_arch.c | ||
interrupt.c | ||
io-workarounds.c | ||
io.c | ||
iomap.c | ||
iommu.c | ||
irq.c | ||
isa-bridge.c | ||
jump_label.c | ||
kgdb.c | ||
kprobes-ftrace.c | ||
kprobes.c | ||
kvm.c | ||
kvm_emul.S | ||
l2cr_6xx.S | ||
legacy_serial.c | ||
Makefile | ||
mce.c | ||
mce_power.c | ||
misc.S | ||
misc_32.S | ||
misc_64.S | ||
module.c | ||
module_32.c | ||
module_64.c | ||
msi.c | ||
note.S | ||
nvram_64.c | ||
of_platform.c | ||
optprobes.c | ||
optprobes_head.S | ||
paca.c | ||
pci-common.c | ||
pci-hotplug.c | ||
pci_32.c | ||
pci_64.c | ||
pci_dn.c | ||
pci_of_scan.c | ||
pmc.c | ||
ppc32.h | ||
ppc_save_regs.S | ||
proc_powerpc.c | ||
process.c | ||
prom.c | ||
prom_init.c | ||
prom_init_check.sh | ||
prom_parse.c | ||
reloc_32.S | ||
reloc_64.S | ||
rtas-proc.c | ||
rtas-rtc.c | ||
rtas.c | ||
rtas_flash.c | ||
rtas_pci.c | ||
rtasd.c | ||
secure_boot.c | ||
security.c | ||
secvar-ops.c | ||
secvar-sysfs.c | ||
setup-common.c | ||
setup.h | ||
setup_32.c | ||
setup_64.c | ||
signal.c | ||
signal.h | ||
signal_32.c | ||
signal_64.c | ||
smp-tbsync.c | ||
smp.c | ||
stacktrace.c | ||
suspend.c | ||
swsusp.c | ||
swsusp_32.S | ||
swsusp_64.c | ||
swsusp_asm64.S | ||
swsusp_booke.S | ||
sys_ppc32.c | ||
syscalls.c | ||
sysfs.c | ||
systbl.S | ||
systbl_chk.sh | ||
tau_6xx.c | ||
time.c | ||
tm.S | ||
traps.c | ||
ucall.S | ||
udbg.c | ||
udbg_16550.c | ||
uprobes.c | ||
vdso.c | ||
vdso32_wrapper.S | ||
vdso64_wrapper.S | ||
vecemu.c | ||
vector.S | ||
vmlinux.lds.S | ||
watchdog.c |