aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
diff options
context:
space:
mode:
authorMickaël Salaün <[email protected]>2025-03-20 19:07:07 +0000
committerMickaël Salaün <[email protected]>2025-03-26 12:59:43 +0000
commitead9079f75696a028aea8860787770c80eddb8f9 (patch)
treed934ecd9e37a3f82bcc46b1fcee6fe9b23eead15 /drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
parentlandlock: Add LANDLOCK_RESTRICT_SELF_LOG_*_EXEC_* flags (diff)
downloadkernel-ead9079f75696a028aea8860787770c80eddb8f9.tar.gz
kernel-ead9079f75696a028aea8860787770c80eddb8f9.zip
landlock: Add LANDLOCK_RESTRICT_SELF_LOG_SUBDOMAINS_OFF
Add LANDLOCK_RESTRICT_SELF_LOG_SUBDOMAINS_OFF for the case of sandboxer tools, init systems, or runtime containers launching programs sandboxing themselves in an inconsistent way. Setting this flag should only depends on runtime configuration (i.e. not hardcoded). We don't create a new ruleset's option because this should not be part of the security policy: only the task that enforces the policy (not the one that create it) knows if itself or its children may request denied actions. This is the first and only flag that can be set without actually restricting the caller (i.e. without providing a ruleset). Extend struct landlock_cred_security with a u8 log_subdomains_off. struct landlock_file_security is still 16 bytes. Cc: Günther Noack <[email protected]> Cc: Paul Moore <[email protected]> Closes: https://github.com/landlock-lsm/linux/issues/3 Link: https://lore.kernel.org/r/[email protected] [mic: Fix comment] Signed-off-by: Mickaël Salaün <[email protected]>
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c')
0 files changed, 0 insertions, 0 deletions