Skip to content
Snippets Groups Projects
Select Git revision
  • 9ee33dc47772724ff583b060bb37c62b92b2d9c4
  • drm-misc-templates default
  • wip/final/kci-gitlab-lava-v1
  • wip/vignesh/kci-lava-gitlab-runner
  • kci-gitlab-igt-v8
  • kci-gitlab-igt-v4
  • drm-misc-fixes-2024-10-02
  • drm-misc-next-2024-09-26
  • drm-misc-fixes-2024-09-26
  • drm-misc-next-2024-09-20
  • drm-misc-fixes-2024-09-12
  • drm-misc-fixes-2024-09-05
  • drm-misc-next-fixes-2024-09-05
  • drm-misc-fixes-2024-08-29
  • drm-misc-next-2024-08-29
  • drm-misc-next-2024-08-22
  • drm-misc-fixes-2024-08-22
  • drm-misc-next-2024-08-16
  • drm-misc-fixes-2024-08-15
  • drm-misc-next-2024-08-09
  • drm-misc-fixes-2024-08-08
  • drm-misc-next-2024-08-01
  • drm-misc-fixes-2024-08-01
  • drm-misc-next-fixes-2024-07-25
  • drm-misc-next-fixes-2024-07-19
  • drm-misc-next-fixes-2024-07-11
26 results

samples

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Linus Torvalds authored
    Pull landlock updates from Mickaël Salaün:
     "A Landlock ruleset can now handle two new access rights:
      LANDLOCK_ACCESS_NET_BIND_TCP and LANDLOCK_ACCESS_NET_CONNECT_TCP. When
      handled, the related actions are denied unless explicitly allowed by a
      Landlock network rule for a specific port.
    
      The related patch series has been reviewed for almost two years, it
      has evolved a lot and we now have reached a decent design, code and
      testing. The refactored kernel code and the new test helpers also
      bring the foundation to support more network protocols.
    
      Test coverage for security/landlock is 92.4% of 710 lines according to
      gcc/gcov-13, and it was 93.1% of 597 lines before this series. The
      decrease in coverage is due to code refactoring to make the ruleset
      management more generic (i.e. dealing with inodes and ports) that also
      added new WARN_ON_ONCE() checks not possible to test from user space.
    
      syzkaller has been updated accordingly [4], and such patched instance
      (tailored to Landlock) has been running for a month, covering all the
      new network-related code [5]"
    
    Link: https://lore.kernel.org/r/20231026014751.414649-1-konstantin.meskhidze@huawei.com [1]
    Link: https://lore.kernel.org/r/CAHC9VhS1wwgH6NNd+cJz4MYogPiRV8NyPDd1yj5SpaxeUB4UVg@mail.gmail.com [2]
    Link: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next-history.git/commit/?id=c8dc5ee69d3a [3]
    Link: https://github.com/google/syzkaller/pull/4266 [4]
    Link: https://storage.googleapis.com/syzbot-assets/82e8608dec36/ci-upstream-linux-next-kasan-gce-root-ab577164.html#security%2flandlock%2fnet.c [5]
    
    * tag 'landlock-6.7-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux:
      selftests/landlock: Add tests for FS topology changes with network rules
      landlock: Document network support
      samples/landlock: Support TCP restrictions
      selftests/landlock: Add network tests
      selftests/landlock: Share enforce_ruleset() helper
      landlock: Support network rules with TCP bind and connect
      landlock: Refactor landlock_add_rule() syscall
      landlock: Refactor layer helpers
      landlock: Move and rename layer helpers
      landlock: Refactor merge/inherit_ruleset helpers
      landlock: Refactor landlock_find_rule/insert_rule helpers
      landlock: Allow FS topology changes for domains without such rule type
      landlock: Make ruleset's access masks more generic
    136cc1e1
    History
    Name Last commit Last update
    ..