From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755834AbcJZQ54 (ORCPT ); Wed, 26 Oct 2016 12:57:56 -0400 Received: from smtp-sh2.infomaniak.ch ([128.65.195.6]:45141 "EHLO smtp-sh2.infomaniak.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753255AbcJZQ5y (ORCPT ); Wed, 26 Oct 2016 12:57:54 -0400 Subject: Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing To: Jann Horn References: <20161026065654.19166-1-mic@digikod.net> <20161026145207.GM3334@pc.thejh.net> Cc: linux-kernel@vger.kernel.org, Alexei Starovoitov , Andy Lutomirski , Daniel Borkmann , Daniel Mack , David Drysdale , "David S . Miller" , "Eric W . Biederman" , James Morris , Kees Cook , Paul Moore , Sargun Dhillon , "Serge E . Hallyn" , Tejun Heo , Thomas Graf , Will Drewry , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, netdev@vger.kernel.org, cgroups@vger.kernel.org From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= Message-ID: <5810E04D.9020300@digikod.net> Date: Wed, 26 Oct 2016 18:56:45 +0200 User-Agent: MIME-Version: 1.0 In-Reply-To: <20161026145207.GM3334@pc.thejh.net> Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="0g9em9kJcG2OCn0j7tG2Msjx06pnKq8aR" X-Antivirus: Dr.Web (R) for Unix mail servers drweb plugin ver.6.0.2.8 X-Antivirus-Code: 0x100000 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --0g9em9kJcG2OCn0j7tG2Msjx06pnKq8aR Content-Type: multipart/mixed; boundary="xSVaUqj13fXmEGcgfmugKc4o5kKiWNwan"; protected-headers="v1" From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= To: Jann Horn Cc: linux-kernel@vger.kernel.org, Alexei Starovoitov , Andy Lutomirski , Daniel Borkmann , Daniel Mack , David Drysdale , "David S . Miller" , "Eric W . Biederman" , James Morris , Kees Cook , Paul Moore , Sargun Dhillon , "Serge E . Hallyn" , Tejun Heo , Thomas Graf , Will Drewry , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, netdev@vger.kernel.org, cgroups@vger.kernel.org Message-ID: <5810E04D.9020300@digikod.net> Subject: Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing References: <20161026065654.19166-1-mic@digikod.net> <20161026145207.GM3334@pc.thejh.net> In-Reply-To: <20161026145207.GM3334@pc.thejh.net> --xSVaUqj13fXmEGcgfmugKc4o5kKiWNwan Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 26/10/2016 16:52, Jann Horn wrote: > On Wed, Oct 26, 2016 at 08:56:36AM +0200, Micka=EBl Sala=FCn wrote: >> The loaded Landlock eBPF programs can be triggered by a seccomp filter= >> returning RET_LANDLOCK. In addition, a cookie (16-bit value) can be pa= ssed from >> a seccomp filter to eBPF programs. This allow flexible security polici= es >> between seccomp and Landlock. >=20 > Is this still up to date, or was that removed in v3? >=20 I forgot to remove this part. In this v4 series, as describe in the (small) patch 11/18, a Landlock rule cannot be triggered by a seccomp filter. So there is no more RET_LANDLOCK nor cookie. --xSVaUqj13fXmEGcgfmugKc4o5kKiWNwan-- --0g9em9kJcG2OCn0j7tG2Msjx06pnKq8aR Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJYEOBNAAoJECLe/t9zvWqVnG0H/36cN8uCe1TJ6AvbhMlqxv+e 7PmLgdJv/k1IXIFF8MDnna4TN7zsdL6mfNWPMtnOisRavTG+K2jUX66d01xmmP03 s97b7jxvMEh9/pBiUTeGW/5B6Q/7syt7O5hNJfawAGQQgpSvubay0FDYGCEubNaC bSCG3yOJZ9dDvpx8SpyU7x9MaUaTjpG6NufHeMiF3LEmz195TmkCW9bWOOY/n5Po iHKLB6PME0oYywX+T+F9Lct5iZ8nosNyz3iE2TB3sQTyI05ha2QxCUe6+qEzqYcM NwTj1S/+rPWJnLeIP3RnNmm/z4hmwtH9Mpix2UptkC/z+zGWLBJQwmnRARuG3Ew= =eMq7 -----END PGP SIGNATURE----- --0g9em9kJcG2OCn0j7tG2Msjx06pnKq8aR--