On 10/20/2022 8:44 AM, Paul Moore wrote:
> On Tue, Sep 27, 2022 at 3:57 PM Casey Schaufler
> wrote:
>> Create a system call lsm_self_attr() to provide the security
>> module maintained attributes of the current process. Historically
>> these attributes have been exposed to user space via entries
On Tue, Sep 27, 2022 at 3:57 PM Casey Schaufler wrote:
>
> Create a system call lsm_self_attr() to provide the security
> module maintained attributes of the current process. Historically
> these attributes have been exposed to user space via entries in
> procfs under /proc/self/attr.
Hi Casey,
At least linux-...@vger.kernel.org should be in Cc for new syscalls.
You need a dedicated patch to wire this syscall with all architectures.
It will help a lot dealing with merge conflicts because of other new
syscalls. You can take a look at the Landlock syscall implementations:
https://git.k
Hi Casey,
I love your patch! Perhaps something to improve:
[auto build test WARNING on linus/master]
[also build test WARNING on v6.0-rc7]
[cannot apply to pcmoore-audit/next pcmoore-selinux/next
zohar-integrity/next-integrity next-20220927]
[If your patch is applied to the wrong git tree, kindl
Create a system call lsm_self_attr() to provide the security
module maintained attributes of the current process. Historically
these attributes have been exposed to user space via entries in
procfs under /proc/self/attr.
Attributes are provided as a collection of lsm_ctx structures
which are place