| 53b9d789 | 19-Oct-2024 |
Matthieu Buffet <[email protected]> |
samples/landlock: Clarify option parsing behaviour
Clarify the distinction between filesystem variables (mandatory) and all others (optional).
For optional variables, explain the difference between
samples/landlock: Clarify option parsing behaviour
Clarify the distinction between filesystem variables (mandatory) and all others (optional).
For optional variables, explain the difference between unset variables (no access check performed) and empty variables (nothing allowed for lists of allowed paths/ports, or no effect for lists of scopes).
List the known LL_SCOPED values and their effect.
Signed-off-by: Matthieu Buffet <[email protected]> Link: https://lore.kernel.org/r/[email protected] [mic: Add a missing colon] Signed-off-by: Mickaël Salaün <[email protected]>
show more ...
|
| f51e55a0 | 19-Oct-2024 |
Matthieu Buffet <[email protected]> |
samples/landlock: Refactor help message
Help message is getting larger with each new supported feature (scopes, and soon UDP). Also the large number of calls to fprintf with environment variables ma
samples/landlock: Refactor help message
Help message is getting larger with each new supported feature (scopes, and soon UDP). Also the large number of calls to fprintf with environment variables make it hard to read. Refactor it away into a single simpler constant format string.
Signed-off-by: Matthieu Buffet <[email protected]> Link: https://lore.kernel.org/r/[email protected] [mic: Move the small cleanups in the next commit] Signed-off-by: Mickaël Salaün <[email protected]>
show more ...
|
| f490e205 | 06-Sep-2024 |
Tahera Fahimi <[email protected]> |
samples/landlock: Add support for signal scoping
The sandboxer can receive the character "s" as input from the environment variable LL_SCOPE to restrict sandboxed processes from sending signals to p
samples/landlock: Add support for signal scoping
The sandboxer can receive the character "s" as input from the environment variable LL_SCOPE to restrict sandboxed processes from sending signals to processes outside of the sandbox.
Example =======
Create a sandboxed shell and pass the character "s" to LL_SCOPED: LL_FS_RO=/ LL_FS_RW=. LL_SCOPED="s" ./sandboxer /bin/bash
Try to send a SIGTRAP to a process with process ID <PID> through: kill -SIGTRAP <PID>
The sandboxed process should not be able to send the signal.
Signed-off-by: Tahera Fahimi <[email protected]> Link: https://lore.kernel.org/r/1f3f1992b2abeb8e5d7aa61b854e1b0721978b9a.1725657728.git.fahimitahera@gmail.com [mic: Improve commit message, simplify code, rebase on previous sample change] Signed-off-by: Mickaël Salaün <[email protected]>
show more ...
|
| f6e53fb2 | 07-Nov-2022 |
Günther Noack <[email protected]> |
samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Add a comment to clarify how to handle best-effort backwards compatibility for LANDLOCK_ACCESS_FS_REFER.
The "refer" acc
samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Add a comment to clarify how to handle best-effort backwards compatibility for LANDLOCK_ACCESS_FS_REFER.
The "refer" access is special because these operations are always forbidden in ABI 1, unlike most other operations, which are permitted when using Landlock ABI levels where they are not supported yet.
Signed-off-by: Günther Noack <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Mickaël Salaün <[email protected]>
show more ...
|
| 81709f3d | 06-May-2022 |
Mickaël Salaün <[email protected]> |
samples/landlock: Format with clang-format
Let's follow a consistent and documented coding style. Everything may not be to our liking but it is better than tacit knowledge. Moreover, this will hel
samples/landlock: Format with clang-format
Let's follow a consistent and documented coding style. Everything may not be to our liking but it is better than tacit knowledge. Moreover, this will help maintain style consistency between different developers.
This contains only whitespace changes.
Automatically formatted with: clang-format-14 -i samples/landlock/*.[ch]
Link: https://lore.kernel.org/r/[email protected] Cc: [email protected] Signed-off-by: Mickaël Salaün <[email protected]>
show more ...
|