Go to file
Christopher Co 4f61392183
kernel: Enable kernel lockdown configs (#722)
* kernel: enable kernel lockdown lsm

* kernel-hyperv: enable kernel lockdown lsm

* kernel-signed: Use uname_r macro everywhere

There was a build break due to an incorrect name used
for vmlinuz in SOURCE1.

The new 5.10 kernel source introduced a new versioning
scheme when built. EXTRAVERSION will always contain
"-rolling-lts-mariner".

In kernel.spec, the vmlinuz we output has the name:
vmlinuz--rolling-lts-mariner-, which
is constructed using vmlinuz-%{uname_r}

So to fix, use vmlinuz-%{uname_r} in the kernel-signed
specs as well.

* add more lockdown configs

CONFIG_SECURITY_LOCKDOWN_LSM_EARLY=y enables the lockdown lsm
very early prior to the security subsystem's initialization.
Still subject to kernel boot parameters.

CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y no lockdown functionality
enabled by default, but can be enabled via kernel commandline or
/sys/kernel/security/lockdown

General distros should set lockdown integrity mode, while special
purpose distros should set lockdown confidentiality mode. These
can be set in the kernel command line

Signed-off-by: Chris Co <chrco@microsoft.com>
2021-03-10 18:04:23 -08:00
.github Addressing a few issues highlighted by "SpellCheck". (#626) 2021-02-10 12:56:45 -08:00
LICENSES-AND-NOTICES Update licenses for the new specs 2020-08-19 01:48:59 +00:00
SPECS kernel: Enable kernel lockdown configs (#722) 2021-03-10 18:04:23 -08:00
SPECS-SIGNED kernel: Enable kernel lockdown configs (#722) 2021-03-10 18:04:23 -08:00
toolkit kernel: Enable kernel lockdown configs (#722) 2021-03-10 18:04:23 -08:00
.gitignore Ignoring the 'build' and 'out' directories. 2020-08-13 15:37:41 -07:00
CODE_OF_CONDUCT.md Initial CODE_OF_CONDUCT.md commit 2020-07-22 12:27:23 -07:00
CONTRIBUTING.md Initial CBL-Mariner commit to GitHub 2020-08-06 20:17:52 -07:00
LICENSE Initial LICENSE commit 2020-07-22 12:27:24 -07:00
README.md Add status badge, update quickstart workflow (#377) 2020-11-13 14:40:30 -08:00
SECURITY.md Initial SECURITY.md commit 2020-07-22 12:27:25 -07:00
cgmanifest.json Update Python3 to 3.7.10, Backport CVE-2021-23336 patch to Python2 (#679) 2021-03-08 14:42:20 -06:00

README.md

CBL-Mariner

Release Branch Status
1.0 1.0 Status

CBL-Mariner is an internal Linux distribution for Microsofts cloud infrastructure and edge products and services. CBL-Mariner is designed to provide a consistent platform for these devices and services and will enhance Microsofts ability to stay current on Linux updates. This initiative is part of Microsofts increasing investment in a wide range of Linux technologies, such as SONiC, Azure Sphere OS and Windows Subsystem for Linux (WSL). CBL-Mariner is being shared publicly as part of Microsofts commitment to Open Source and to contribute back to the Linux community. CBL-Mariner does not change our approach or commitment to any existing third-party Linux distribution offerings.

CBL-Mariner has been engineered with the notion that a small common core set of packages can address the universal needs of first party cloud and edge services while allowing individual teams to layer additional packages on top of the common core to produce images for their workloads. This is made possible by a simple build system that enables:

  • Package Generation: This produces the desired set of RPM packages from SPEC files and source files.
  • Image Generation: This produces the desired image artifacts like ISOs or VHDs from a given set of packages.

Whether deployed as a container or a container host, CBL-Mariner consumes limited disk and memory resources. The lightweight characteristics of CBL-Mariner also provides faster boot times and a minimal attack surface. By focusing the features in the core image to just what is needed for our internal cloud customers there are fewer services to load, and fewer attack vectors.

When security vulnerabilities arise, CBL-Mariner supports both a package-based update model and an image based update model. Leveraging the common RPM Package Manager system, CBL-Mariner makes the latest security patches and fixes available for download with the goal of fast turn-around times.

Getting Started with CBL-Mariner:

Instructions for building CBL-Mariner may be found here: Toolkit Documentation

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

Acknowledgments

Any Linux distribution, including CBL-Mariner, benefits from contributions by the open software community. We gratefully acknowledge all contributions made from the broader open source community, in particular:

  1. The Photon OS Project for SPEC files originating from the Photon distribution.

  2. The Fedora Project for SPEC files, particularly with respect to QT, DNF and several of their dependencies.

  3. GNU and the Free Software Foundation

  4. Linux from Scratch

  5. Openmamba for SPEC files