# git rev-parse -q --verify 26b84401da8458c5cbd6818d5732f7bbb84124a2^{commit} # git fetch -q -n -f git://fs.ozlabs.ibm.com/kernel/linus master warning: The last gc run reported the following. Please correct the root cause and remove .git/gc.log. Automatic cleanup will not be performed until the file is removed. warning: There are too many unreachable loose objects; run 'git prune' to remove them. # git rev-parse -q --verify 26b84401da8458c5cbd6818d5732f7bbb84124a2^{commit} 26b84401da8458c5cbd6818d5732f7bbb84124a2 # git checkout -q -f -B kisskb 26b84401da8458c5cbd6818d5732f7bbb84124a2 # git clean -qxdf # < git log -1 # commit 26b84401da8458c5cbd6818d5732f7bbb84124a2 # Merge: e816da29bc0c 1e7d8bcbe37d # Author: Linus Torvalds # Date: Mon Oct 3 17:51:52 2022 -0700 # # Merge tag 'lsm-pr-20221003' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm # # Pull LSM updates from Paul Moore: # "Seven patches for the LSM layer and we've got a mix of trivial and # significant patches. Highlights below, starting with the smaller bits # first so they don't get lost in the discussion of the larger items: # # - Remove some redundant NULL pointer checks in the common LSM audit # code. # # - Ratelimit the lockdown LSM's access denial messages. # # With this change there is a chance that the last visible lockdown # message on the console is outdated/old, but it does help preserve # the initial series of lockdown denials that started the denial # message flood and my gut feeling is that these might be the more # valuable messages. # # - Open userfaultfds as readonly instead of read/write. # # While this code obviously lives outside the LSM, it does have a # noticeable impact on the LSMs with Ondrej explaining the situation # in the commit description. It is worth noting that this patch # languished on the VFS list for over a year without any comments # (objections or otherwise) so I took the liberty of pulling it into # the LSM tree after giving fair notice. It has been in linux-next # since the end of August without any noticeable problems. # # - Add a LSM hook for user namespace creation, with implementations # for both the BPF LSM and SELinux. # # Even though the changes are fairly small, this is the bulk of the # diffstat as we are also including BPF LSM selftests for the new # hook. # # It's also the most contentious of the changes in this pull request # with Eric Biederman NACK'ing the LSM hook multiple times during its # development and discussion upstream. While I've never taken NACK's # lightly, I'm sending these patches to you because it is my belief # that they are of good quality, satisfy a long-standing need of # users and distros, and are in keeping with the existing nature of # the LSM layer and the Linux Kernel as a whole. # # The patches in implement a LSM hook for user namespace creation # that allows for a granular approach, configurable at runtime, which # enables both monitoring and control of user namespaces. The general # consensus has been that this is far preferable to the other # solutions that have been adopted downstream including outright # removal from the kernel, disabling via system wide sysctls, or # various other out-of-tree mechanisms that users have been forced to # adopt since we haven't been able to provide them an upstream # solution for their requests. Eric has been steadfast in his # objections to this LSM hook, explaining that any restrictions on # the user namespace could have significant impact on userspace. # While there is the possibility of impacting userspace, it is # important to note that this solution only impacts userspace when it # is requested based on the runtime configuration supplied by the # distro/admin/user. Frederick (the pathset author), the LSM/security # community, and myself have tried to work with Eric during # development of this patchset to find a mutually acceptable # solution, but Eric's approach and unwillingness to engage in a # meaningful way have made this impossible. I have CC'd Eric directly # on this pull request so he has a chance to provide his side of the # story; there have been no objections outside of Eric's" # # * tag 'lsm-pr-20221003' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm: # lockdown: ratelimit denial messages # userfaultfd: open userfaultfds with O_RDONLY # selinux: Implement userns_create hook # selftests/bpf: Add tests verifying bpf lsm userns_create hook # bpf-lsm: Make bpf_lsm_userns_create() sleepable # security, lsm: Introduce security_create_user_ns() # lsm: clean up redundant NULL pointer check # < /opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc --version # < /opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux-ld --version # < git log --format=%s --max-count=1 26b84401da8458c5cbd6818d5732f7bbb84124a2 # < make -s -j 8 ARCH=x86_64 O=/kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux- randconfig # Added to kconfig CONFIG_STANDALONE=y # Added to kconfig CONFIG_PREVENT_FIRMWARE_BUILD=y # Added to kconfig CONFIG_CC_STACKPROTECTOR_STRONG=n # Added to kconfig CONFIG_GCC_PLUGINS=n # Added to kconfig CONFIG_GCC_PLUGIN_CYC_COMPLEXITY=n # Added to kconfig CONFIG_GCC_PLUGIN_SANCOV=n # Added to kconfig CONFIG_GCC_PLUGIN_LATENT_ENTROPY=n # Added to kconfig CONFIG_BPF_PRELOAD=n # Added to kconfig # < make -s -j 8 ARCH=x86_64 O=/kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux- help # make -s -j 8 ARCH=x86_64 O=/kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux- olddefconfig .config:5861:warning: override: reassigning to symbol PREVENT_FIRMWARE_BUILD .config:5863:warning: override: reassigning to symbol GCC_PLUGINS .config:5867:warning: override: reassigning to symbol BPF_PRELOAD # make -s -j 8 ARCH=x86_64 O=/kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux- vmlinux.o: warning: objtool: tipc_nametbl_publish.cold+0x19: relocation to !ENDBR: tipc_nametbl_publish+0x1cf /bin/sh: 1: zstd: not found cat: write error: Broken pipe make[3]: *** [/kisskb/src/arch/x86/boot/compressed/Makefile:145: arch/x86/boot/compressed/vmlinux.bin.zst] Error 127 make[3]: *** Deleting file 'arch/x86/boot/compressed/vmlinux.bin.zst' make[3]: *** Waiting for unfinished jobs.... make[2]: *** [/kisskb/src/arch/x86/boot/Makefile:115: arch/x86/boot/compressed/vmlinux] Error 2 make[1]: *** [/kisskb/src/arch/x86/Makefile:282: bzImage] Error 2 make[1]: *** Waiting for unfinished jobs.... make: *** [Makefile:231: __sub-make] Error 2 Command 'make -s -j 8 ARCH=x86_64 O=/kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-11.1.0-nolibc/x86_64-linux/bin/x86_64-linux- ' returned non-zero exit status 2 # rm -rf /kisskb/build/linus-rand_x86_64-randconfig_x86_64-gcc11 # Build took: 0:13:54.117303