Thread (77 messages) 77 messages, 12 authors, 2011-05-29

Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering

From: Ingo Molnar <hidden>
Date: 2011-05-17 12:57:00
Also in: linux-arm-kernel, linuxppc-dev

* Will Drewry [off-list ref] wrote:
quoted
This is *far* more generic still yields the same short-term end result as 
far as your sandboxing is concerned.
Almost :/ [...]
Hey that's a pretty good result from a subsystem that was not written with your 
usecase in mind *at all* ;-)
[...]  I still need to review the code you've pointed out, but, at present, 
the ftrace hooks occur after the seccomp and syscall auditing hooks.  This 
means that that code is exposed no matter what in this model.  To trim the 
exposed surface to userspace, we really need those early hooks.  While I can 
see both hacky and less hacky approaches around this, it stills strikes me 
that the seccomp thread flag and early interception are good to reuse.  One 
option might be to allow seccomp to be a secure-syscall event source, but I 
suspect that lands more on the hack-y side of the fence :)
Agreed, there should be no security compromise imposed on your usecase, at all.

You could move the event callback sooner into the syscall-entry sequence to 
make sure it's the highest priority thing to process?

There's no semantic dependency on its current location so this can be changed 
AFAICS.

Thanks,

	Ingo
Keyboard shortcuts
hback out one level
jnext message in thread
kprevious message in thread
ldrill in
Escclose help / fold thread tree
?toggle this help