[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1501730353-46840-1-git-send-email-keescook@chromium.org>
Date: Wed, 2 Aug 2017 20:19:09 -0700
From: Kees Cook <keescook@...omium.org>
To: linux-kernel@...r.kernel.org
Cc: Kees Cook <keescook@...omium.org>,
Fabricio Voznika <fvoznika@...gle.com>,
Tyler Hicks <tyhicks@...onical.com>,
Andy Lutomirski <luto@...capital.net>,
Will Drewry <wad@...omium.org>, Shuah Khan <shuah@...nel.org>,
linux-kselftest@...r.kernel.org,
linux-security-module@...r.kernel.org
Subject: [PATCH 0/4] seccomp: Add SECCOMP_FILTER_FLAG_KILL_PROCESS
This series is the result of Fabricio and I going around a few times
on possible solutions for finding a way to enhance RET_KILL to kill
the process group. There's a lot of ways this could be done, but I
wanted something that felt cleanest. As it happens, Tyler's recent
patch series for logging improvement also needs to know a litte bit
more during filter runs, and the solution for both is to pass back
the matched filter. This lets us examine it here for RET_KILL and
in the future for logging changes.
The filter passing is patch 1, the new flag for RET_KILL is patch 2.
Some test refactoring is in patch 3 for the RET_DATA ordering, and
patch 4 is the test for the new RET_KILL flag.
Please take a look!
Thanks,
-Kees
Powered by blists - more mailing lists