diff options
| author | Mickaël Salaün <mic@linux.microsoft.com> | 2023-10-10 18:28:59 +0200 |
|---|---|---|
| committer | Aleksandr Nogikh <nogikh@google.com> | 2023-10-13 13:15:32 +0000 |
| commit | 2f3c16ff202947ee7671f5b36c2cd294449ff26f (patch) | |
| tree | 34284618dc5d7d58c946c2eae031cb80f3766651 /sys/linux/test/landlock_fs_accesses | |
| parent | 6388bc36373b7e4e4dbac9101b34007e839a74bd (diff) | |
sys/linux: add the Landlock network rule type and access rights
Add the new lanlock_net_port_attr struct and related
LANDLOCK_ACCESS_NET_{BIND,CONNECT}_TCP flags for TCP access control.
Add landlock_ruleset_attr's handled_access_net field and fix
handled_access_fs name.
Update tests with the new landlock_ruleset_attr's handled_access_net
field.
Signed-off-by: Mickaël Salaün <mic@linux.microsoft.com>
Diffstat (limited to 'sys/linux/test/landlock_fs_accesses')
| -rw-r--r-- | sys/linux/test/landlock_fs_accesses | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/linux/test/landlock_fs_accesses b/sys/linux/test/landlock_fs_accesses index c7d8fc486..18a8cb983 100644 --- a/sys/linux/test/landlock_fs_accesses +++ b/sys/linux/test/landlock_fs_accesses @@ -33,7 +33,7 @@ symlinkat(&AUTO='./file2\x00', 0xffffffffffffff9c, &AUTO='./file6\x00') # Creates a ruleset to restrict all kind of file creation. -r0 = landlock_create_ruleset(&AUTO={0x1fff}, AUTO, 0x0) +r0 = landlock_create_ruleset(&AUTO={0x1fff, 0x0}, AUTO, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) |
