Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes

2022-10-20 Thread Casey Schaufler
On 10/20/2022 8:44 AM, Paul Moore wrote: > On Tue, Sep 27, 2022 at 3:57 PM Casey Schaufler > wrote: >> Create a system call lsm_self_attr() to provide the security >> module maintained attributes of the current process. Historically >> these attributes have been exposed to user space via entries

Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes

2022-10-20 Thread Paul Moore
On Tue, Sep 27, 2022 at 3:57 PM Casey Schaufler wrote: > > Create a system call lsm_self_attr() to provide the security > module maintained attributes of the current process. Historically > these attributes have been exposed to user space via entries in > procfs under /proc/self/attr. Hi Casey,

Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes

2022-10-12 Thread Mickaël Salaün
At least linux-...@vger.kernel.org should be in Cc for new syscalls. You need a dedicated patch to wire this syscall with all architectures. It will help a lot dealing with merge conflicts because of other new syscalls. You can take a look at the Landlock syscall implementations: https://git.k

Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes

2022-09-30 Thread kernel test robot
Hi Casey, I love your patch! Perhaps something to improve: [auto build test WARNING on linus/master] [also build test WARNING on v6.0-rc7] [cannot apply to pcmoore-audit/next pcmoore-selinux/next zohar-integrity/next-integrity next-20220927] [If your patch is applied to the wrong git tree, kindl

[PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes

2022-09-27 Thread Casey Schaufler
Create a system call lsm_self_attr() to provide the security module maintained attributes of the current process. Historically these attributes have been exposed to user space via entries in procfs under /proc/self/attr. Attributes are provided as a collection of lsm_ctx structures which are place