[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABqD9hbCp=Z=t=TegOYRD6Z8RzyhP7w8Eskf+=J1EPgUat+JjA@mail.gmail.com>
Date: Thu, 12 Jan 2012 11:08:08 -0600
From: Will Drewry <wad@...omium.org>
To: Oleg Nesterov <oleg@...hat.com>
Cc: Steven Rostedt <rostedt@...dmis.org>, linux-kernel@...r.kernel.org,
keescook@...omium.org, john.johansen@...onical.com,
serge.hallyn@...onical.com, coreyb@...ux.vnet.ibm.com,
pmoore@...hat.com, eparis@...hat.com, djm@...drot.org,
torvalds@...ux-foundation.org, segoon@...nwall.com,
jmorris@...ei.org, scarybeasts@...il.com, avi@...hat.com,
penberg@...helsinki.fi, viro@...iv.linux.org.uk, luto@....edu,
mingo@...e.hu, akpm@...ux-foundation.org, khilman@...com,
borislav.petkov@....com, amwang@...hat.com, ak@...ux.intel.com,
eric.dumazet@...il.com, gregkh@...e.de, dhowells@...hat.com,
daniel.lezcano@...e.fr, linux-fsdevel@...r.kernel.org,
linux-security-module@...r.kernel.org, olofj@...omium.org,
mhalcrow@...gle.com, dlaor@...hat.com
Subject: Re: [RFC,PATCH 1/2] seccomp_filters: system call filtering using BPF
On Thu, Jan 12, 2012 at 10:47 AM, Oleg Nesterov <oleg@...hat.com> wrote:
> On 01/12, Steven Rostedt wrote:
>>
>> On Thu, 2012-01-12 at 17:14 +0100, Oleg Nesterov wrote:
>>
>> > May be this needs something like LSM_UNSAFE_SECCOMP, or perhaps
>> > cap_bprm_set_creds() should take seccomp.mode == 2 into account, I dunno.
>> >
>> > OTOH, currently seccomp.mode == 1 doesn't allow to exec at all.
>>
>> I've never used seccomp, so I admit I'm totally ignorant on this topic.
>
> me too ;)
>
>> But looking at seccomp from the outside, the biggest advantage to this
>> would be the ability for normal processes to be able to limit tasks it
>> kicks off. If I want to run a task in a sandbox, I don't want to be root
>> to do so.
>>
>> I guess a web browser doesn't perform an exec to run java programs. But
>> it would be nice if I could execute something from the command line that
>> I could run in a sand box.
>>
>> What's the problem with making sure that the setuid isn't set before
>> doing an execv? Only fail when setuid (or some other magic) is enabled
>> on the file being exec'd.
>
> I agree. That is why I mentioned LSM_UNSAFE_SECCOMP/cap_bprm_set_creds.
> Just I do not know what would be the most simple/clean way to do this.
>
>
> And in any case I agree that the current seccomp_check_exec() looks
> strange. Btw, it does
> {
> if (current->seccomp.mode != 2)
> return 0;
> /* We can rely on the task refcount for the filter. */
> if (!current->seccomp.filter)
> return -EPERM;
>
> How it is possible to have seccomp.filter == NULL with mode == 2?
It shouldn't be. It's another relic I missed from development. (Adding to v3 :)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists