[PATCH] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Günther Noack
gnoack3000 at gmail.com
Fri Nov 4 17:01:49 UTC 2022
On Thu, Nov 03, 2022 at 03:21:32PM +0100, Mickaël Salaün wrote:
> On 30/10/2022 07:11, Günther Noack wrote:
> > Add a comment to clarify how to handle best-effort backwards
> > compatibility for LANDLOCK_ACCESS_FS_REFER.
> >
> > The "refer" access is special because these operations are always
> > forbidden in ABI 1, unlike most other operations, which are permitted
> > when using Landlock ABI levels where they are not supported yet.
> >
> > Signed-off-by: Günther Noack <gnoack3000 at gmail.com>
> > ---
> > samples/landlock/sandboxer.c | 16 +++++++++++++++-
> > 1 file changed, 15 insertions(+), 1 deletion(-)
> >
> > diff --git a/samples/landlock/sandboxer.c b/samples/landlock/sandboxer.c
> > index fd4237c64fb2..901acb383124 100644
> > --- a/samples/landlock/sandboxer.c
> > +++ b/samples/landlock/sandboxer.c
> > @@ -234,7 +234,21 @@ int main(const int argc, char *const argv[], char *const *const envp)
> > + * If only ABI 1 is available, the sample tool knowingly forbids
>
> s/the sample tool/this sandboxer/
>
> > + * refer operations.
> > + *
> > + * If a program *needs* to do refer operations after enabling
> > + * Landlock, it can not use Landlock at ABI level 1. To be
> > + * compatible across different kernels, such programs should
> > + * fall back to not using Landlock instead.
>
> To be compatible with different kernel versions, such programs should then
> fall back to not restrict themselves at all if the running kernel only
> supports ABI 1.
Thanks for the review, Mickaël! Both suggestions applied, and sent V2.
—Günther
--
More information about the Linux-security-module-archive
mailing list