# git rev-parse -q --verify 17ae69aba89dbfa2139b7f8024b757ab3cc42f59^{commit} 17ae69aba89dbfa2139b7f8024b757ab3cc42f59 already have revision, skipping fetch # git checkout -q -f -B kisskb 17ae69aba89dbfa2139b7f8024b757ab3cc42f59 # git clean -qxdf # < git log -1 # commit 17ae69aba89dbfa2139b7f8024b757ab3cc42f59 # Merge: e6f0bf09f066 3532b0b4352c # Author: Linus Torvalds # Date: Sat May 1 18:50:44 2021 -0700 # # Merge tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security # # Pull Landlock LSM from James Morris: # "Add Landlock, a new LSM from Mickaël Salaün. # # Briefly, Landlock provides for unprivileged application sandboxing. # # From Mickaël's cover letter: # "The goal of Landlock is to enable to restrict ambient rights (e.g. # global filesystem access) for a set of processes. Because Landlock # is a stackable LSM [1], it makes possible to create safe security # sandboxes as new security layers in addition to the existing # system-wide access-controls. This kind of sandbox is expected to # help mitigate the security impact of bugs or unexpected/malicious # behaviors in user-space applications. Landlock empowers any # process, including unprivileged ones, to securely restrict # themselves. # # Landlock is inspired by seccomp-bpf but instead of filtering # syscalls and their raw arguments, a Landlock rule can restrict the # use of kernel objects like file hierarchies, according to the # kernel semantic. Landlock also takes inspiration from other OS # sandbox mechanisms: XNU Sandbox, FreeBSD Capsicum or OpenBSD # Pledge/Unveil. # # In this current form, Landlock misses some access-control features. # This enables to minimize this patch series and ease review. This # series still addresses multiple use cases, especially with the # combined use of seccomp-bpf: applications with built-in sandboxing, # init systems, security sandbox tools and security-oriented APIs [2]" # # The cover letter and v34 posting is here: # # https://lore.kernel.org/linux-security-module/20210422154123.13086-1-mic@digikod.net/ # # See also: # # https://landlock.io/ # # This code has had extensive design discussion and review over several # years" # # Link: https://lore.kernel.org/lkml/50db058a-7dde-441b-a7f9-f6837fe8b69f@schaufler-ca.com/ [1] # Link: https://lore.kernel.org/lkml/f646e1c7-33cf-333f-070c-0a40ad0468cd@digikod.net/ [2] # # * tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: # landlock: Enable user space to infer supported features # landlock: Add user and kernel documentation # samples/landlock: Add a sandbox manager example # selftests/landlock: Add user space tests # landlock: Add syscall implementations # arch: Wire up Landlock syscalls # fs,security: Add sb_delete hook # landlock: Support filesystem access-control # LSM: Infrastructure management of the superblock # landlock: Add ptrace restrictions # landlock: Set up the security framework and manage credentials # landlock: Add ruleset and domain management # landlock: Add object management # < /opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux-gcc --version # < /opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux-ld --version # < git log --format=%s --max-count=1 17ae69aba89dbfa2139b7f8024b757ab3cc42f59 # < make -s -j 24 ARCH=sparc64 O=/kisskb/build/linus_sparc64-allmodconfig_sparc64 CROSS_COMPILE=/opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux- allmodconfig # Added to kconfig CONFIG_BUILD_DOCSRC=n # Added to kconfig CONFIG_HAVE_FTRACE_MCOUNT_RECORD=n # Added to kconfig CONFIG_SAMPLES=n # Added to kconfig CONFIG_MODULE_SIG=n # < make -s -j 24 ARCH=sparc64 O=/kisskb/build/linus_sparc64-allmodconfig_sparc64 CROSS_COMPILE=/opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux- help # make -s -j 24 ARCH=sparc64 O=/kisskb/build/linus_sparc64-allmodconfig_sparc64 CROSS_COMPILE=/opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux- olddefconfig # make -s -j 24 ARCH=sparc64 O=/kisskb/build/linus_sparc64-allmodconfig_sparc64 CROSS_COMPILE=/opt/cross/kisskb/br-sparc64-full-2016.08-613-ge98b4dd/bin/sparc64-linux- :1511:2: warning: #warning syscall clone3 not implemented [-Wcpp] In file included from /kisskb/src/include/linux/kernel.h:14:0, from /kisskb/src/include/linux/list.h:9, from /kisskb/src/include/linux/module.h:12, from /kisskb/src/drivers/gpu/drm/ttm/ttm_pool.c:34: /kisskb/src/drivers/gpu/drm/ttm/ttm_pool.c: In function 'ttm_pool_alloc': /kisskb/src/include/linux/minmax.h:18:28: warning: comparison of distinct pointer types lacks a cast (!!(sizeof((typeof(x) *)1 == (typeof(y) *)1))) ^ /kisskb/src/include/linux/minmax.h:32:4: note: in expansion of macro '__typecheck' (__typecheck(x, y) && __no_side_effects(x, y)) ^ /kisskb/src/include/linux/minmax.h:42:24: note: in expansion of macro '__safe_cmp' __builtin_choose_expr(__safe_cmp(x, y), \ ^ /kisskb/src/include/linux/minmax.h:51:19: note: in expansion of macro '__careful_cmp' #define min(x, y) __careful_cmp(x, y, <) ^ /kisskb/src/drivers/gpu/drm/ttm/ttm_pool.c:386:15: note: in expansion of macro 'min' for (order = min(MAX_ORDER - 1UL, __fls(num_pages)); num_pages; ^ /kisskb/src/drivers/input/joystick/analog.c:160:2: warning: #warning Precise timer not defined for this architecture. [-Wcpp] #warning Precise timer not defined for this architecture. ^ kernel: arch/sparc/boot/image is ready kernel: arch/sparc/boot/zImage is ready Completed OK # rm -rf /kisskb/build/linus_sparc64-allmodconfig_sparc64 # Build took: 0:21:24.211550