linux-man.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Alejandro Colomar <alx@kernel.org>
To: "Günther Noack" <gnoack@google.com>
Cc: "Mickaël Salaün" <mic@digikod.net>, linux-man@vger.kernel.org
Subject: Re: [PATCH] landlock_restrict_self.2: Fix max number of nested sandboxes
Date: Thu, 14 Mar 2024 18:12:44 +0100	[thread overview]
Message-ID: <ZfMwDAY8OlQKgKF6@debian> (raw)
In-Reply-To: <ZfMqg8SkfynNnoAO@google.com>

[-- Attachment #1: Type: text/plain, Size: 1433 bytes --]

On Thu, Mar 14, 2024 at 05:49:07PM +0100, Günther Noack wrote:
> On Thu, Mar 14, 2024 at 05:11:00PM +0100, Alejandro Colomar wrote:
> > Hi Günther, Mickaël,
> > 
> > On Thu, Mar 14, 2024 at 05:08:02PM +0100, Alejandro Colomar wrote:
> > > > >  .TP
> > > > >  .B E2BIG
> > > > >  The maximum number of composed rulesets is reached for the calling thread.
> > > > > -This limit is currently 64.
> > > > > +This limit is currently 16.
> > 
> > BTW, do you think this limit change is something relevant for HISTORY?
> > Or should we maybe not document the limit?  Or maybe should the kernel
> > provide a macro to name that limit (and thus let a user grep it in their
> > headers to learn their specific value)?  Or maybe a combination?
> 
> I doubt that anyone has run into that limit in real life yet (but I'd be happy
> to learn about it if they did).
> 
> I think the most important reason why this limit is mentionworthy is because
> landlock_restrict_self() can fail when a process is trying to stack the N+1th
> Landlock policy on top.  For programs that don't know all of their parent
> processes in detail, they anyway can't make assumptions about how many policies
> can still be stacked.  So whether the limit is 64 or 16, it does not make much
> of a difference for the code that people have to write.

Hmmm, thanks!

Cheers,
Alex

> —Günther

-- 
<https://www.alejandro-colomar.es/>

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

      reply	other threads:[~2024-03-14 17:12 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-12 15:15 [PATCH] landlock_restrict_self.2: Fix max number of nested sandboxes Mickaël Salaün
2024-03-13  9:07 ` Günther Noack
2024-03-13  9:12 ` Günther Noack
2024-03-14 16:08   ` Alejandro Colomar
2024-03-14 16:11     ` Alejandro Colomar
2024-03-14 16:49       ` Günther Noack
2024-03-14 17:12         ` Alejandro Colomar [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZfMwDAY8OlQKgKF6@debian \
    --to=alx@kernel.org \
    --cc=gnoack@google.com \
    --cc=linux-man@vger.kernel.org \
    --cc=mic@digikod.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).