Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <31389618-9260-382b-841c-e6cd11505f21@digikod.net>
Date: Wed, 11 Aug 2021 17:05:51 +0200
From: Mickaël Salaün <mic@...ikod.net>
To: musl@...ts.openwall.com, Rich Felker <dalias@...ifal.cx>,
 landlock@...ts.linux.dev, Szabolcs Nagy <nsz@...t70.net>
Subject: Re: [PATCH v1] bits/syscall.h: add landlock_* from linux v5.13


On 11/08/2021 16:56, Szabolcs Nagy wrote:
> * Mickaël Salaün <mic@...ikod.net> [2021-08-10 17:54:06 +0200]:
>> From: Mickaël Salaün <mic@...ux.microsoft.com>
>>
>> Add three system calls for all architectures:
>> * landlock_create_ruleset
>> * landlock_add_rule
>> * landlock_restrict_self
>>
>> They enable creating unprivileged security sandboxes, see
>>
>>   linux commit a49f4f81cb48925e8d7cbd9e59068f516e984144
>>   arch: Wire up Landlock syscalls
>>
>> https://www.kernel.org/doc/html/latest/userspace-api/landlock.html
>>
>> Signed-off-by: Mickaël Salaün <mic@...ux.microsoft.com>
>> Link: https://lore.kernel.org/r/20210810155406.2772584-1-mic@digikod.net
> 
> thanks,
> 
> note i have outstanding patches to update musl to linux 5.13
> 
> https://www.openwall.com/lists/musl/2021/07/10/12
> 

OK, cool!

BTW, what is the policy to add syscall APIs (e.g. the
landlock_create_ruleset function)?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.