|
Message-ID: <31389618-9260-382b-841c-e6cd11505f21@digikod.net> Date: Wed, 11 Aug 2021 17:05:51 +0200 From: Mickaël Salaün <mic@...ikod.net> To: musl@...ts.openwall.com, Rich Felker <dalias@...ifal.cx>, landlock@...ts.linux.dev, Szabolcs Nagy <nsz@...t70.net> Subject: Re: [PATCH v1] bits/syscall.h: add landlock_* from linux v5.13 On 11/08/2021 16:56, Szabolcs Nagy wrote: > * Mickaël Salaün <mic@...ikod.net> [2021-08-10 17:54:06 +0200]: >> From: Mickaël Salaün <mic@...ux.microsoft.com> >> >> Add three system calls for all architectures: >> * landlock_create_ruleset >> * landlock_add_rule >> * landlock_restrict_self >> >> They enable creating unprivileged security sandboxes, see >> >> linux commit a49f4f81cb48925e8d7cbd9e59068f516e984144 >> arch: Wire up Landlock syscalls >> >> https://www.kernel.org/doc/html/latest/userspace-api/landlock.html >> >> Signed-off-by: Mickaël Salaün <mic@...ux.microsoft.com> >> Link: https://lore.kernel.org/r/20210810155406.2772584-1-mic@digikod.net > > thanks, > > note i have outstanding patches to update musl to linux 5.13 > > https://www.openwall.com/lists/musl/2021/07/10/12 > OK, cool! BTW, what is the policy to add syscall APIs (e.g. the landlock_create_ruleset function)?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.