https://bugs.kde.org/show_bug.cgi?id=489913

Mark Wielaard <m...@klomp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|CONFIRMED                   |RESOLVED
         Resolution|---                         |FIXED

--- Comment #2 from Mark Wielaard <m...@klomp.org> ---
Thanks. I made a couple of tweaks so that the landlock_ruleset_attr given to
landlock_create_ruleset is initialized. Added a POST for
landlock_create_ruleset to track the returned file descriptor. And check the
file descriptor given to landlock_add_rule and landlock_restrict_self is valid.
And since it is a generic syscall I also hooked up the other
syswrap-<arch>-linux.c files.

It already found a ruleset fd "leak" in xz with --track-fds=yes.

Depending on the rules installed valgrind might file opening files though, like
debug files. So maybe we may also want a mode where landlock_create_ruleset
just fails with EOPNOTSUPP.

commit b1453546fe7396e7d4b4b2fc8ec7e64b71d18611
Author: Peter Seiderer <ps.rep...@gmx.net>
Date:   Mon Jul 8 11:05:47 2024 +0200

    Add support for landlock_create_ruleset (444), landlock_add_rule (445) and
landlock_restrict_self (446) syscalls

    - add support for landlock_create_ruleset (444) syscall
    - add support for landlock_add_rule (445) syscall
    - add support for landlock_restrict_self (446) syscall

    https://bugs.kde.org/show_bug.cgi?id=489913

    Signed-off-by: Peter Seiderer <ps.rep...@gmx.net>

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to