All of lore.kernel.org
 help / color / mirror / Atom feed
From: Will Drewry <wad@chromium.org>
To: Eric Paris <eparis@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>,
	Ingo Molnar <mingo@elte.hu>, James Morris <jmorris@namei.org>,
	linux-kernel@vger.kernel.org,
	Steven Rostedt <rostedt@goodmis.org>,
	Frederic Weisbecker <fweisbec@gmail.com>,
	kees.cook@canonical.com, agl@chromium.org,
	"Serge E. Hallyn" <serge@hallyn.com>,
	Ingo Molnar <mingo@redhat.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Tejun Heo <tj@kernel.org>, Michal Marek <mmarek@suse.cz>,
	Oleg Nesterov <oleg@redhat.com>, Jiri Slaby <jslaby@suse.cz>,
	David Howells <dhowells@redhat.com>,
	Russell King <linux@arm.linux.org.uk>,
	Michal Simek <monstr@monstr.eu>,
	Ralf Baechle <ralf@linux-mips.org>,
	Benjamin Herrenschmidt <benh@kernel.crashing.org>,
	Paul Mackerras <paulus@samba.org>,
	Martin Schwidefsky <schwidefsky@de.ibm.com>,
	Heiko Carstens <heiko.carstens@de.ibm.com>,
	linux390@de.ibm.com, Paul Mundt <lethal@linux-sh.org>,
	"David S. Miller" <davem@davemloft.net>,
	Thomas Gleixner <tglx@linutronix.de>,
	"H. Peter Anvin" <hpa@zytor.com>,
	x86@kernel.org, linux-arm-kernel@lists.infradead.org,
	linux-mips@linux-mips.org, linuxppc-dev@lists.ozlabs.org,
	linux-s390@vger.kernel.org, linux-sh@vger.kernel.org,
	sparclinux@vger.kernel.org,
	Linus Torvalds <torvalds@linux-foundation.org>
Subject: Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering
Date: Fri, 13 May 2011 11:29:06 -0500	[thread overview]
Message-ID: <BANLkTinDO0OSav7NgjuE4E5E-Yu2==EQwg@mail.gmail.com> (raw)
In-Reply-To: <1305302141.2076.56.camel@localhost.localdomain>

On Fri, May 13, 2011 at 10:55 AM, Eric Paris <eparis@redhat.com> wrote:
> On Fri, 2011-05-13 at 17:23 +0200, Peter Zijlstra wrote:
>> On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:
>> > Then again, I certainly don't see a
>> > reason that this syscall hardening patch should be held up while a whole
>> > new concept in computer security is contemplated...
>>
>> Which makes me wonder why this syscall hardening stuff is done outside
>> of LSM? Why isn't is part of the LSM so that say SELinux can have a
>> syscall bitmask per security context?
>
> I could do that, but I like Will's approach better.  From the PoV of
> meeting security goals of information flow, data confidentiality,
> integrity, least priv, etc limiting on the syscall boundary doesn't make
> a lot of sense.  You just don't know enough there to enforce these
> things.  These are the types of goals that SELinux and other LSMs have
> previously tried to enforce.  From the PoV of making the kernel more
> resistant to attacks and making a process more resistant to misbehavior
> I think that the syscall boundary is appropriate.  Although I could do
> it in SELinux it don't really want to do it there.

There's also the problem that there are no hooks per-system call for
LSMs, only logical hooks that sometimes mirror system call names and
are called after user data has been parsed.  If system call enter
hooks, like seccomp's, were added for LSMs, it would allow the lsm
bitmask approach, but it still wouldn't satisfy the issues you raise
below (and I wholeheartedly agree with).

> In case people are interested or confused let me give my definition of
> two words I've used a bit in these conversations: discretionary and
> mandatory.  Any time I talk about a 'discretionary' security decision it
> is a security decisions that a process imposed upon itself.  Aka the
> choice to use seccomp is discretionary.  The choice to mark our own file
> u-wx is discretionary.  This isn't the best definition but it's one that
> works well in this discussion.  Mandatory security is one enforce by a
> global policy.  It's what selinux is all about.  SELinux doesn't give
> hoot what a process wants to do, it enforces a global policy from the
> top down.  You take over a process, well, too bad, you still have no
> choice but to follow the mandatory policy.
>
> The LSM does NOT enforce a mandatory access control model, it's just how
> it's been used in the past.  Ingo appears to me (please correct me if
> I'm wrong) to really be a fan of exposing the flexibility of the LSM to
> a discretionary access control model.  That doesn't seem like a bad
> idea.  And maybe using the filter engine to define the language to do
> this isn't a bad idea either.  But I think that's a 'down the road'
> project, not something to hold up a better seccomp.
>
>> Making it part of the LSM also avoids having to add this prctl().
>
> Well, it would mean exposing some new language construct to every LSM
> (instead of a single prctl construct) and it would mean anyone wanting
> to use the interface would have to rely on the LSM implementing those
> hooks the way they need it.  Honestly chrome can already get all of the
> benefits of this patch (given a perfectly coded kernel) and a whole lot
> more using SELinux, but (surprise surprise) not everyone uses SELinux.
> I think it's a good idea to expose a simple interface which will be
> widely enough adopted that many userspace applications can rely on it
> for hardening.
>
> The existence of the LSM and the fact that there exists multiple
> security modules that may or may not be enabled really leads application
> developers to be unable to rely on LSM for security.  If linux had a
> single security model which everyone could rely on we wouldn't really
> have as big of an issue but that's not possible.  So I'm advocating for
> this series which will provide a single useful change which applications
> can rely upon across distros and platforms to enhance the properties and
> abilities of the linux kernel.
>
> -Eric
>
>

WARNING: multiple messages have this Message-ID (diff)
From: Will Drewry <wad@chromium.org>
To: Eric Paris <eparis@redhat.com>
Cc: linux-mips@linux-mips.org, linux-sh@vger.kernel.org,
	Peter Zijlstra <peterz@infradead.org>,
	Frederic Weisbecker <fweisbec@gmail.com>,
	Heiko Carstens <heiko.carstens@de.ibm.com>,
	Oleg Nesterov <oleg@redhat.com>,
	David Howells <dhowells@redhat.com>,
	Paul Mackerras <paulus@samba.org>,
	"H. Peter Anvin" <hpa@zytor.com>,
	sparclinux@vger.kernel.org, Jiri Slaby <jslaby@suse.cz>,
	linux-s390@vger.kernel.org, Russell King <linux@arm.linux.org.uk>,
	x86@kernel.org, James Morris <jmorris@namei.org>,
	Linus Torvalds <torvalds@linux-foundation.org>,
	Ingo Molnar <mingo@redhat.com>, Ingo Molnar <mingo@elte.hu>,
	"Serge E. Hallyn" <serge@hallyn.com>,
	Steven Rostedt <rostedt@goodmis.org>, Tejun Heo <tj@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	kees.cook@canonical.com, linux-arm-kernel@lists.infradead.org,
	Michal Marek <mmarek@suse.cz>, Michal Simek <monstr@monstr.eu>,
	linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org,
	Ralf Baechle <ralf@linux-mips.org>,
	Paul Mundt <lethal@linux-sh.org>,
	Martin Schwidefsky <schwidefsky@de.ibm.com>,
	linux390@de.ibm.com, Andrew Morton <akpm@linux-foundation.org>,
	agl@chromium.org, "David S. Miller" <davem@davemloft.net>
Subject: Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering
Date: Fri, 13 May 2011 11:29:06 -0500	[thread overview]
Message-ID: <BANLkTinDO0OSav7NgjuE4E5E-Yu2==EQwg@mail.gmail.com> (raw)
In-Reply-To: <1305302141.2076.56.camel@localhost.localdomain>

On Fri, May 13, 2011 at 10:55 AM, Eric Paris <eparis@redhat.com> wrote:
> On Fri, 2011-05-13 at 17:23 +0200, Peter Zijlstra wrote:
>> On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:
>> > Then again, I certainly don't see a
>> > reason that this syscall hardening patch should be held up while a who=
le
>> > new concept in computer security is contemplated...
>>
>> Which makes me wonder why this syscall hardening stuff is done outside
>> of LSM? Why isn't is part of the LSM so that say SELinux can have a
>> syscall bitmask per security context?
>
> I could do that, but I like Will's approach better. =A0From the PoV of
> meeting security goals of information flow, data confidentiality,
> integrity, least priv, etc limiting on the syscall boundary doesn't make
> a lot of sense. =A0You just don't know enough there to enforce these
> things. =A0These are the types of goals that SELinux and other LSMs have
> previously tried to enforce. =A0From the PoV of making the kernel more
> resistant to attacks and making a process more resistant to misbehavior
> I think that the syscall boundary is appropriate. =A0Although I could do
> it in SELinux it don't really want to do it there.

There's also the problem that there are no hooks per-system call for
LSMs, only logical hooks that sometimes mirror system call names and
are called after user data has been parsed.  If system call enter
hooks, like seccomp's, were added for LSMs, it would allow the lsm
bitmask approach, but it still wouldn't satisfy the issues you raise
below (and I wholeheartedly agree with).

> In case people are interested or confused let me give my definition of
> two words I've used a bit in these conversations: discretionary and
> mandatory. =A0Any time I talk about a 'discretionary' security decision i=
t
> is a security decisions that a process imposed upon itself. =A0Aka the
> choice to use seccomp is discretionary. =A0The choice to mark our own fil=
e
> u-wx is discretionary. =A0This isn't the best definition but it's one tha=
t
> works well in this discussion. =A0Mandatory security is one enforce by a
> global policy. =A0It's what selinux is all about. =A0SELinux doesn't give
> hoot what a process wants to do, it enforces a global policy from the
> top down. =A0You take over a process, well, too bad, you still have no
> choice but to follow the mandatory policy.
>
> The LSM does NOT enforce a mandatory access control model, it's just how
> it's been used in the past. =A0Ingo appears to me (please correct me if
> I'm wrong) to really be a fan of exposing the flexibility of the LSM to
> a discretionary access control model. =A0That doesn't seem like a bad
> idea. =A0And maybe using the filter engine to define the language to do
> this isn't a bad idea either. =A0But I think that's a 'down the road'
> project, not something to hold up a better seccomp.
>
>> Making it part of the LSM also avoids having to add this prctl().
>
> Well, it would mean exposing some new language construct to every LSM
> (instead of a single prctl construct) and it would mean anyone wanting
> to use the interface would have to rely on the LSM implementing those
> hooks the way they need it. =A0Honestly chrome can already get all of the
> benefits of this patch (given a perfectly coded kernel) and a whole lot
> more using SELinux, but (surprise surprise) not everyone uses SELinux.
> I think it's a good idea to expose a simple interface which will be
> widely enough adopted that many userspace applications can rely on it
> for hardening.
>
> The existence of the LSM and the fact that there exists multiple
> security modules that may or may not be enabled really leads application
> developers to be unable to rely on LSM for security. =A0If linux had a
> single security model which everyone could rely on we wouldn't really
> have as big of an issue but that's not possible. =A0So I'm advocating for
> this series which will provide a single useful change which applications
> can rely upon across distros and platforms to enhance the properties and
> abilities of the linux kernel.
>
> -Eric
>
>

WARNING: multiple messages have this Message-ID (diff)
From: wad@chromium.org (Will Drewry)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering
Date: Fri, 13 May 2011 11:29:06 -0500	[thread overview]
Message-ID: <BANLkTinDO0OSav7NgjuE4E5E-Yu2==EQwg@mail.gmail.com> (raw)
In-Reply-To: <1305302141.2076.56.camel@localhost.localdomain>

On Fri, May 13, 2011 at 10:55 AM, Eric Paris <eparis@redhat.com> wrote:
> On Fri, 2011-05-13 at 17:23 +0200, Peter Zijlstra wrote:
>> On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:
>> > Then again, I certainly don't see a
>> > reason that this syscall hardening patch should be held up while a whole
>> > new concept in computer security is contemplated...
>>
>> Which makes me wonder why this syscall hardening stuff is done outside
>> of LSM? Why isn't is part of the LSM so that say SELinux can have a
>> syscall bitmask per security context?
>
> I could do that, but I like Will's approach better. ?From the PoV of
> meeting security goals of information flow, data confidentiality,
> integrity, least priv, etc limiting on the syscall boundary doesn't make
> a lot of sense. ?You just don't know enough there to enforce these
> things. ?These are the types of goals that SELinux and other LSMs have
> previously tried to enforce. ?From the PoV of making the kernel more
> resistant to attacks and making a process more resistant to misbehavior
> I think that the syscall boundary is appropriate. ?Although I could do
> it in SELinux it don't really want to do it there.

There's also the problem that there are no hooks per-system call for
LSMs, only logical hooks that sometimes mirror system call names and
are called after user data has been parsed.  If system call enter
hooks, like seccomp's, were added for LSMs, it would allow the lsm
bitmask approach, but it still wouldn't satisfy the issues you raise
below (and I wholeheartedly agree with).

> In case people are interested or confused let me give my definition of
> two words I've used a bit in these conversations: discretionary and
> mandatory. ?Any time I talk about a 'discretionary' security decision it
> is a security decisions that a process imposed upon itself. ?Aka the
> choice to use seccomp is discretionary. ?The choice to mark our own file
> u-wx is discretionary. ?This isn't the best definition but it's one that
> works well in this discussion. ?Mandatory security is one enforce by a
> global policy. ?It's what selinux is all about. ?SELinux doesn't give
> hoot what a process wants to do, it enforces a global policy from the
> top down. ?You take over a process, well, too bad, you still have no
> choice but to follow the mandatory policy.
>
> The LSM does NOT enforce a mandatory access control model, it's just how
> it's been used in the past. ?Ingo appears to me (please correct me if
> I'm wrong) to really be a fan of exposing the flexibility of the LSM to
> a discretionary access control model. ?That doesn't seem like a bad
> idea. ?And maybe using the filter engine to define the language to do
> this isn't a bad idea either. ?But I think that's a 'down the road'
> project, not something to hold up a better seccomp.
>
>> Making it part of the LSM also avoids having to add this prctl().
>
> Well, it would mean exposing some new language construct to every LSM
> (instead of a single prctl construct) and it would mean anyone wanting
> to use the interface would have to rely on the LSM implementing those
> hooks the way they need it. ?Honestly chrome can already get all of the
> benefits of this patch (given a perfectly coded kernel) and a whole lot
> more using SELinux, but (surprise surprise) not everyone uses SELinux.
> I think it's a good idea to expose a simple interface which will be
> widely enough adopted that many userspace applications can rely on it
> for hardening.
>
> The existence of the LSM and the fact that there exists multiple
> security modules that may or may not be enabled really leads application
> developers to be unable to rely on LSM for security. ?If linux had a
> single security model which everyone could rely on we wouldn't really
> have as big of an issue but that's not possible. ?So I'm advocating for
> this series which will provide a single useful change which applications
> can rely upon across distros and platforms to enhance the properties and
> abilities of the linux kernel.
>
> -Eric
>
>

  reply	other threads:[~2011-05-13 16:29 UTC|newest]

Thread overview: 406+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-04-28  3:08 [PATCH 2/7] tracing: split out syscall_trace_enter construction Will Drewry
2011-04-28  3:08 ` [PATCH 3/7] seccomp_filter: Enable ftrace-based system call filtering Will Drewry
2011-04-28 13:50   ` Steven Rostedt
2011-04-28 15:30     ` Will Drewry
2011-04-28 16:20       ` Serge E. Hallyn
2011-04-28 16:56       ` Steven Rostedt
2011-04-28 18:02         ` Will Drewry
2011-04-28 14:29   ` Frederic Weisbecker
2011-04-28 15:15     ` Will Drewry
2011-04-28 15:57       ` Frederic Weisbecker
2011-04-28 16:05         ` Will Drewry
2011-04-28 15:12   ` Frederic Weisbecker
2011-04-28 15:20     ` Frederic Weisbecker
2011-04-28 15:29     ` Will Drewry
2011-04-28 16:13       ` Frederic Weisbecker
2011-04-28 16:48         ` Will Drewry
2011-04-28 17:36           ` Frederic Weisbecker
2011-04-28 18:21             ` Will Drewry
2011-04-28 16:28   ` Steven Rostedt
2011-04-28 16:53     ` Will Drewry
2011-04-28 16:55   ` Serge E. Hallyn
2011-04-28 17:16     ` Steven Rostedt
2011-04-28 17:39       ` Serge E. Hallyn
2011-04-28 18:01         ` Will Drewry
2011-04-28 18:21           ` Steven Rostedt
2011-04-28 18:34             ` Will Drewry
2011-04-28 18:54               ` Serge E. Hallyn
2011-04-28 19:07                 ` Steven Rostedt
2011-05-12  3:02                   ` [PATCH 3/5] v2 seccomp_filters: " Will Drewry
2011-05-12  3:02                     ` Will Drewry
2011-05-12  3:02                     ` Will Drewry
2011-05-12  7:48                     ` Ingo Molnar
2011-05-12  7:48                       ` Ingo Molnar
2011-05-12  7:48                       ` Ingo Molnar
2011-05-12  9:24                       ` Kees Cook
2011-05-12  9:24                         ` Kees Cook
2011-05-12  9:24                         ` Kees Cook
2011-05-12 10:49                         ` Ingo Molnar
2011-05-12 10:49                           ` Ingo Molnar
2011-05-12 10:49                           ` Ingo Molnar
2011-05-12 11:44                       ` James Morris
2011-05-12 11:44                         ` James Morris
2011-05-12 11:44                         ` James Morris
2011-05-12 13:01                         ` Ingo Molnar
2011-05-12 13:01                           ` Ingo Molnar
2011-05-12 13:01                           ` Ingo Molnar
2011-05-12 16:26                           ` Will Drewry
2011-05-12 16:26                             ` Will Drewry
2011-05-12 16:26                             ` Will Drewry
2011-05-16 12:55                             ` Ingo Molnar
2011-05-16 12:55                               ` Ingo Molnar
2011-05-16 12:55                               ` Ingo Molnar
2011-05-16 14:42                               ` Will Drewry
2011-05-16 14:42                                 ` Will Drewry
2011-05-16 14:42                                 ` Will Drewry
2011-05-13  0:18                           ` James Morris
2011-05-13  0:18                             ` James Morris
2011-05-13  0:18                             ` James Morris
2011-05-13 12:10                             ` Ingo Molnar
2011-05-13 12:10                               ` Ingo Molnar
2011-05-13 12:10                               ` Ingo Molnar
2011-05-13 12:19                               ` Peter Zijlstra
2011-05-13 12:19                                 ` Peter Zijlstra
2011-05-13 12:19                                 ` Peter Zijlstra
2011-05-13 12:26                                 ` Ingo Molnar
2011-05-13 12:26                                   ` Ingo Molnar
2011-05-13 12:26                                   ` Ingo Molnar
2011-05-13 12:39                                   ` Peter Zijlstra
2011-05-13 12:39                                     ` Peter Zijlstra
2011-05-13 12:39                                     ` Peter Zijlstra
2011-05-13 12:43                                     ` Peter Zijlstra
2011-05-13 12:43                                       ` Peter Zijlstra
2011-05-13 12:43                                       ` Peter Zijlstra
2011-05-13 12:54                                       ` Ingo Molnar
2011-05-13 12:54                                         ` Ingo Molnar
2011-05-13 12:54                                         ` Ingo Molnar
2011-05-13 13:08                                         ` Peter Zijlstra
2011-05-13 13:08                                           ` Peter Zijlstra
2011-05-13 13:08                                           ` Peter Zijlstra
2011-05-13 13:18                                           ` Ingo Molnar
2011-05-13 13:18                                             ` Ingo Molnar
2011-05-13 13:18                                             ` Ingo Molnar
2011-05-13 13:55                                             ` Peter Zijlstra
2011-05-13 13:55                                               ` Peter Zijlstra
2011-05-13 13:55                                               ` Peter Zijlstra
2011-05-13 14:57                                               ` Ingo Molnar
2011-05-13 14:57                                                 ` Ingo Molnar
2011-05-13 14:57                                                 ` Ingo Molnar
2011-05-13 15:27                                                 ` Peter Zijlstra
2011-05-13 15:27                                                   ` Peter Zijlstra
2011-05-13 15:27                                                   ` Peter Zijlstra
2011-05-14  7:05                                                   ` Ingo Molnar
2011-05-14  7:05                                                     ` Ingo Molnar
2011-05-14  7:05                                                     ` Ingo Molnar
2011-05-16 16:23                                                 ` Steven Rostedt
2011-05-16 16:23                                                   ` Steven Rostedt
2011-05-16 16:23                                                   ` Steven Rostedt
2011-05-16 16:52                                                   ` Ingo Molnar
2011-05-16 16:52                                                     ` Ingo Molnar
2011-05-16 16:52                                                     ` Ingo Molnar
2011-05-16 17:03                                                     ` Steven Rostedt
2011-05-16 17:03                                                       ` Steven Rostedt
2011-05-16 17:03                                                       ` Steven Rostedt
2011-05-17 12:42                                                       ` Ingo Molnar
2011-05-17 12:42                                                         ` Ingo Molnar
2011-05-17 12:42                                                         ` Ingo Molnar
2011-05-17 13:05                                                         ` Steven Rostedt
2011-05-17 13:05                                                           ` Steven Rostedt
2011-05-17 13:05                                                           ` Steven Rostedt
2011-05-17 13:19                                                           ` Ingo Molnar
2011-05-17 13:19                                                             ` Ingo Molnar
2011-05-17 13:19                                                             ` Ingo Molnar
2011-05-19  4:07                                                             ` Will Drewry
2011-05-19  4:07                                                               ` Will Drewry
2011-05-19  4:07                                                               ` Will Drewry
2011-05-19 12:22                                                               ` Steven Rostedt
2011-05-19 12:22                                                                 ` Steven Rostedt
2011-05-19 12:22                                                                 ` Steven Rostedt
2011-05-19 21:05                                                                 ` Will Drewry
2011-05-19 21:05                                                                   ` Will Drewry
2011-05-19 21:05                                                                   ` Will Drewry
2011-05-24 15:59                                                                   ` Will Drewry
2011-05-24 15:59                                                                     ` Will Drewry
2011-05-24 15:59                                                                     ` Will Drewry
2011-05-24 16:20                                                                     ` Peter Zijlstra
2011-05-24 16:20                                                                       ` Peter Zijlstra
2011-05-24 16:20                                                                       ` Peter Zijlstra
2011-05-24 16:25                                                                       ` Thomas Gleixner
2011-05-24 16:25                                                                         ` Thomas Gleixner
2011-05-24 16:25                                                                         ` Thomas Gleixner
2011-05-24 19:00                                                                         ` Will Drewry
2011-05-24 19:00                                                                           ` Will Drewry
2011-05-24 19:00                                                                           ` Will Drewry
2011-05-24 19:54                                                                       ` Ingo Molnar
2011-05-24 19:54                                                                         ` Ingo Molnar
2011-05-24 19:54                                                                         ` Ingo Molnar
2011-05-24 20:10                                                                         ` Ingo Molnar
2011-05-24 20:10                                                                           ` Ingo Molnar
2011-05-24 20:10                                                                           ` Ingo Molnar
2011-05-25 10:35                                                                         ` Thomas Gleixner
2011-05-25 10:35                                                                           ` Thomas Gleixner
2011-05-25 10:35                                                                           ` Thomas Gleixner
2011-05-25 15:01                                                                           ` Ingo Molnar
2011-05-25 15:01                                                                             ` Ingo Molnar
2011-05-25 15:01                                                                             ` Ingo Molnar
2011-05-25 17:43                                                                             ` Peter Zijlstra
2011-05-25 17:43                                                                               ` Peter Zijlstra
2011-05-25 17:43                                                                               ` Peter Zijlstra
2011-05-29 20:17                                                                               ` Ingo Molnar
2011-05-29 20:17                                                                                 ` Ingo Molnar
2011-05-29 20:17                                                                                 ` Ingo Molnar
2011-05-25 17:48                                                                             ` Thomas Gleixner
2011-05-25 17:48                                                                               ` Thomas Gleixner
2011-05-25 17:48                                                                               ` Thomas Gleixner
2011-05-25 18:01                                                                               ` Kees Cook
2011-05-25 18:42                                                                                 ` Linus Torvalds
2011-05-25 19:06                                                                                   ` Ingo Molnar
2011-05-25 19:54                                                                                     ` Will Drewry
2011-05-25 19:11                                                                                   ` Kees Cook
2011-05-25 20:01                                                                                     ` Linus Torvalds
2011-05-25 20:19                                                                                       ` Ingo Molnar
2011-06-09  9:00                                                                                         ` Sven Anders
2011-05-26 14:37                                                                                       ` Colin Walters
2011-05-26 15:03                                                                                         ` Linus Torvalds
2011-05-26 15:28                                                                                           ` Colin Walters
2011-05-26 16:33                                                                                           ` Will Drewry
2011-05-26 16:46                                                                                             ` Linus Torvalds
2011-05-26 17:02                                                                                               ` Will Drewry
2011-05-26 17:04                                                                                                 ` Will Drewry
2011-05-26 17:17                                                                                                 ` Linus Torvalds
2011-05-26 17:38                                                                                                   ` Will Drewry
2011-05-26 18:33                                                                                                     ` Linus Torvalds
2011-05-26 18:47                                                                                                       ` Ingo Molnar
2011-05-26 19:05                                                                                                         ` david
2011-05-26 19:09                                                                                                           ` Eric Paris
2011-05-26 19:46                                                                                                           ` Ingo Molnar
2011-05-26 19:49                                                                                                             ` david
2011-05-26 18:49                                                                                                       ` Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 01/13] tracing: split out filter initialization and clean up Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 02/13] tracing: split out syscall_trace_enter construction Will Drewry
2011-06-01  7:00                                                                                                           ` Ingo Molnar
2011-06-01 17:15                                                                                                             ` Will Drewry
2011-06-02 14:29                                                                                                               ` Ingo Molnar
2011-06-02 15:18                                                                                                                 ` Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 03/13] seccomp_filters: new mode with configurable syscall filters Will Drewry
2011-06-02 17:36                                                                                                           ` Paul E. McKenney
2011-06-02 18:14                                                                                                             ` Will Drewry
2011-06-02 19:42                                                                                                               ` Paul E. McKenney
2011-06-02 20:28                                                                                                                 ` Will Drewry
2011-06-02 20:46                                                                                                                   ` Steven Rostedt
2011-06-02 21:12                                                                                                                     ` Paul E. McKenney
2011-06-01  3:10                                                                                                         ` [PATCH v3 04/13] seccomp_filter: add process state reporting Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 05/13] seccomp_filter: Document what seccomp_filter is and how it works Will Drewry
2011-06-01 21:23                                                                                                           ` Kees Cook
2011-06-01 23:03                                                                                                             ` Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 06/13] x86: add HAVE_SECCOMP_FILTER and seccomp_execve Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 07/13] arm: select HAVE_SECCOMP_FILTER Will Drewry
2011-06-01  3:10                                                                                                           ` Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 08/13] microblaze: select HAVE_SECCOMP_FILTER and provide seccomp_execve Will Drewry
2011-06-01  5:37                                                                                                           ` Michal Simek
2011-06-01  3:10                                                                                                         ` [PATCH v3 09/13] mips: " Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 10/13] s390: " Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 11/13] powerpc: " Will Drewry
2011-06-01  3:10                                                                                                           ` Will Drewry
2011-06-01  3:10                                                                                                         ` [PATCH v3 12/13] sparc: " Will Drewry
2011-06-01  3:10                                                                                                           ` Will Drewry
2011-06-01  3:35                                                                                                           ` David Miller
2011-06-01  3:35                                                                                                             ` [PATCH v3 12/13] sparc: select HAVE_SECCOMP_FILTER and provide David Miller
2011-06-01  3:10                                                                                                         ` [PATCH v3 13/13] sh: select HAVE_SECCOMP_FILTER Will Drewry
2011-06-01  3:10                                                                                                           ` Will Drewry
2011-06-02  5:27                                                                                                           ` Paul Mundt
2011-06-02  5:27                                                                                                             ` Paul Mundt
2011-05-26 17:38                                                                                                 ` [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering Valdis.Kletnieks
2011-05-26 18:08                                                                                                   ` Will Drewry
2011-05-26 18:22                                                                                                     ` Valdis.Kletnieks
2011-05-26 17:07                                                                                               ` Steven Rostedt
2011-05-26 18:43                                                                                                 ` Casey Schaufler
2011-05-26 18:54                                                                                                   ` Steven Rostedt
2011-05-26 18:34                                                                                               ` david
2011-05-26 18:54                                                                                               ` Ingo Molnar
2011-05-26  1:19                                                                                   ` James Morris
2011-05-26  6:08                                                                                     ` Avi Kivity
2011-05-26  8:24                                                                                     ` Ingo Molnar
2011-05-26  8:35                                                                                       ` Pekka Enberg
2011-05-26  8:49                                                                                       ` Avi Kivity
2011-05-26  8:57                                                                                         ` Pekka Enberg
     [not found]                                                                                           ` <20110526085939.GG29458@redhat.com>
2011-05-26 10:38                                                                                             ` Ingo Molnar
2011-05-26 10:46                                                                                               ` Avi Kivity
2011-05-26 10:46                                                                                               ` Gleb Natapov
2011-05-26 11:11                                                                                                 ` Ingo Molnar
2011-05-26  9:30                                                                                         ` Ingo Molnar
2011-05-26  9:48                                                                                           ` Ingo Molnar
2011-05-26 11:02                                                                                             ` Avi Kivity
2011-05-26 11:16                                                                                               ` Ingo Molnar
2011-05-26 10:56                                                                                           ` Avi Kivity
2011-05-26 11:38                                                                                             ` Ingo Molnar
2011-05-26 18:06                                                                                               ` Avi Kivity
2011-05-26 18:15                                                                                                 ` Ingo Molnar
2011-05-26 18:20                                                                                                   ` Avi Kivity
2011-05-26 18:36                                                                                                     ` Ingo Molnar
2011-05-26 18:43                                                                                                       ` Valdis.Kletnieks
2011-05-26 18:50                                                                                                         ` Ingo Molnar
2011-05-26 18:22                                                                                                   ` Peter Zijlstra
2011-05-26 18:38                                                                                                     ` Ingo Molnar
2011-05-27  0:12                                                                                                       ` James Morris
2011-05-29 16:51                                                                                   ` Aneesh Kumar K.V
2011-05-29 17:02                                                                                     ` Linus Torvalds
2011-05-29 18:23                                                                                       ` Al Viro
2011-05-26  8:43                                                                               ` Ingo Molnar
2011-05-26  8:43                                                                                 ` Ingo Molnar
2011-05-26  8:43                                                                                 ` Ingo Molnar
2011-05-26  9:15                                                                               ` Ingo Molnar
2011-05-26  9:15                                                                                 ` Ingo Molnar
2011-05-26  9:15                                                                                 ` Ingo Molnar
2011-05-24 20:08                                                                     ` Ingo Molnar
2011-05-24 20:08                                                                       ` Ingo Molnar
2011-05-24 20:08                                                                       ` Ingo Molnar
2011-05-24 20:14                                                                       ` Steven Rostedt
2011-05-24 20:14                                                                         ` Steven Rostedt
2011-05-24 20:14                                                                         ` Steven Rostedt
2011-05-24 20:25                                                                       ` Kees Cook
2011-05-25 19:09                                                                         ` Ingo Molnar
2011-05-25 16:40                                                                       ` Will Drewry
2011-05-13 15:17                                             ` Eric Paris
2011-05-13 15:17                                               ` Eric Paris
2011-05-13 15:17                                               ` Eric Paris
2011-05-13 15:29                                               ` [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system callfiltering David Laight
2011-05-13 15:29                                                 ` David Laight
2011-05-13 15:29                                                 ` David Laight
2011-05-13 15:29                                                 ` David Laight
2011-05-16 12:03                                                 ` Ingo Molnar
2011-05-16 12:03                                                   ` Ingo Molnar
2011-05-16 12:03                                                   ` Ingo Molnar
2011-05-13 12:49                                     ` [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering Ingo Molnar
2011-05-13 12:49                                       ` Ingo Molnar
2011-05-13 12:49                                       ` Ingo Molnar
2011-05-13 13:55                                       ` Peter Zijlstra
2011-05-13 13:55                                         ` Peter Zijlstra
2011-05-13 13:55                                         ` Peter Zijlstra
2011-05-13 15:02                                         ` Ingo Molnar
2011-05-13 15:02                                           ` Ingo Molnar
2011-05-13 15:02                                           ` Ingo Molnar
2011-05-13 15:10                               ` Eric Paris
2011-05-13 15:10                                 ` Eric Paris
2011-05-13 15:10                                 ` Eric Paris
2011-05-13 15:23                                 ` Peter Zijlstra
2011-05-13 15:23                                   ` Peter Zijlstra
2011-05-13 15:23                                   ` Peter Zijlstra
2011-05-13 15:55                                   ` Eric Paris
2011-05-13 15:55                                     ` Eric Paris
2011-05-13 15:55                                     ` Eric Paris
2011-05-13 16:29                                     ` Will Drewry [this message]
2011-05-13 16:29                                       ` Will Drewry
2011-05-13 16:29                                       ` Will Drewry
2011-05-14  7:30                                 ` Ingo Molnar
2011-05-14  7:30                                   ` Ingo Molnar
2011-05-14  7:30                                   ` Ingo Molnar
2011-05-14 20:57                                   ` Will Drewry
2011-05-14 20:57                                     ` Will Drewry
2011-05-14 20:57                                     ` Will Drewry
2011-05-14 20:57                                     ` Will Drewry
2011-05-16 12:43                                     ` Ingo Molnar
2011-05-16 12:43                                       ` Ingo Molnar
2011-05-16 12:43                                       ` Ingo Molnar
2011-05-16 15:29                                       ` Will Drewry
2011-05-16 15:29                                         ` Will Drewry
2011-05-16 15:29                                         ` Will Drewry
2011-05-17 12:57                                         ` Ingo Molnar
2011-05-17 12:57                                           ` Ingo Molnar
2011-05-17 12:57                                           ` Ingo Molnar
2011-05-16  0:36                               ` James Morris
2011-05-16  0:36                                 ` James Morris
2011-05-16  0:36                                 ` James Morris
2011-05-16 15:08                                 ` Ingo Molnar
2011-05-16 15:08                                   ` Ingo Molnar
2011-05-16 15:08                                   ` Ingo Molnar
2011-05-17  2:24                                   ` James Morris
2011-05-17  2:24                                     ` James Morris
2011-05-17  2:24                                     ` James Morris
2011-05-17 13:10                                     ` Ingo Molnar
2011-05-17 13:10                                       ` Ingo Molnar
2011-05-17 13:10                                       ` Ingo Molnar
2011-05-17 13:29                                       ` James Morris
2011-05-17 13:29                                         ` James Morris
2011-05-17 13:29                                         ` James Morris
2011-05-17 13:29                                         ` James Morris
2011-05-17 18:34                                         ` Ingo Molnar
2011-05-17 18:34                                           ` Ingo Molnar
2011-05-17 18:34                                           ` Ingo Molnar
2011-05-26  6:27                                 ` Pavel Machek
2011-05-26  6:27                                   ` Pavel Machek
2011-05-26  6:27                                   ` Pavel Machek
2011-05-26  8:35                                   ` Ingo Molnar
2011-05-26  8:35                                     ` Ingo Molnar
2011-05-26  8:35                                     ` Ingo Molnar
2011-05-12 12:15                       ` Frederic Weisbecker
2011-05-12 12:15                         ` Frederic Weisbecker
2011-05-12 12:15                         ` Frederic Weisbecker
2011-05-12 11:33                     ` James Morris
2011-05-12 11:33                       ` James Morris
2011-05-12 11:33                       ` James Morris
2011-05-13 19:35                     ` Arnd Bergmann
2011-05-13 19:35                       ` Arnd Bergmann
2011-05-13 19:35                       ` Arnd Bergmann
2011-05-14 20:58                       ` Will Drewry
2011-05-14 20:58                         ` Will Drewry
2011-05-14 20:58                         ` Will Drewry
2011-05-15  6:42                         ` Arnd Bergmann
2011-05-15  6:42                           ` Arnd Bergmann
2011-05-15  6:42                           ` Arnd Bergmann
2011-05-16 12:00                           ` Ingo Molnar
2011-05-16 12:00                             ` Ingo Molnar
2011-05-16 12:00                             ` Ingo Molnar
2011-05-16 15:26                     ` Steven Rostedt
2011-05-16 15:26                       ` Steven Rostedt
2011-05-16 15:26                       ` Steven Rostedt
2011-05-16 15:28                       ` Will Drewry
2011-05-16 15:28                         ` Will Drewry
2011-05-16 15:28                         ` Will Drewry
2011-04-28 19:06               ` [PATCH 3/7] seccomp_filter: " Steven Rostedt
2011-04-28 18:51           ` Serge E. Hallyn
2011-05-03  8:39   ` Avi Kivity
2011-04-28  3:08 ` [PATCH 4/7] seccomp_filter: add process state reporting Will Drewry
2011-04-28  3:21   ` KOSAKI Motohiro
2011-04-28  3:24     ` Will Drewry
2011-04-28  3:40       ` Al Viro
2011-04-28  3:43         ` Will Drewry
2011-04-28 22:54       ` James Morris
2011-05-02 10:08         ` Will Drewry
2011-05-12  3:04   ` [PATCH 4/5] v2 " Will Drewry
2011-04-28  3:08 ` [PATCH 5/7] seccomp_filter: Document what seccomp_filter is and how it works Will Drewry
2011-04-28  7:06   ` Ingo Molnar
2011-04-28 14:56     ` Eric Paris
2011-04-28 18:37       ` Will Drewry
2011-04-29 13:18         ` Frederic Weisbecker
2011-04-29 16:13           ` Will Drewry
2011-05-03  1:29             ` Frederic Weisbecker
2011-05-03  1:47               ` Frederic Weisbecker
2011-05-04  9:15                 ` Will Drewry
2011-05-04  9:29                   ` Will Drewry
2011-05-04 17:52                   ` Frederic Weisbecker
2011-05-04 18:23                     ` Steven Rostedt
2011-05-04 18:30                       ` Frederic Weisbecker
2011-05-04 18:46                         ` Steven Rostedt
2011-05-05  9:21                           ` Will Drewry
2011-05-05 13:14                             ` Serge E. Hallyn
2011-05-12  3:20                               ` Will Drewry
2011-05-06 11:53                             ` Steven Rostedt
2011-05-06 13:35                               ` Eric Paris
2011-05-07  1:58                               ` Will Drewry
2011-05-12  3:04                                 ` [PATCH 5/5] v2 " Will Drewry
2011-05-06 16:30                             ` [PATCH 5/7] " Eric Paris
2011-05-07  2:11                               ` Will Drewry
2011-05-04 12:16                 ` Steven Rostedt
2011-05-04 15:54                   ` Eric Paris
2011-05-04 16:06                     ` Steven Rostedt
2011-05-04 16:22                       ` Eric Paris
2011-05-04 16:39                         ` Steven Rostedt
2011-05-04 18:02                           ` Eric Paris
2011-05-04 17:03                         ` Frederic Weisbecker
2011-05-04 17:55                           ` Eric Paris
2011-04-28 17:43     ` Serge E. Hallyn
2011-04-28 15:46   ` Randy Dunlap
2011-04-28 18:23     ` Will Drewry
2011-04-28  3:08 ` [PATCH 6/7] include/linux/syscalls.h: add __ layer of macros with return types Will Drewry
2011-04-28  3:08 ` [PATCH 7/7] arch/x86: hook int returning system calls Will Drewry

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='BANLkTinDO0OSav7NgjuE4E5E-Yu2==EQwg@mail.gmail.com' \
    --to=wad@chromium.org \
    --cc=agl@chromium.org \
    --cc=akpm@linux-foundation.org \
    --cc=benh@kernel.crashing.org \
    --cc=davem@davemloft.net \
    --cc=dhowells@redhat.com \
    --cc=eparis@redhat.com \
    --cc=fweisbec@gmail.com \
    --cc=heiko.carstens@de.ibm.com \
    --cc=hpa@zytor.com \
    --cc=jmorris@namei.org \
    --cc=jslaby@suse.cz \
    --cc=kees.cook@canonical.com \
    --cc=lethal@linux-sh.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mips@linux-mips.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linux-sh@vger.kernel.org \
    --cc=linux390@de.ibm.com \
    --cc=linux@arm.linux.org.uk \
    --cc=linuxppc-dev@lists.ozlabs.org \
    --cc=mingo@elte.hu \
    --cc=mingo@redhat.com \
    --cc=mmarek@suse.cz \
    --cc=monstr@monstr.eu \
    --cc=oleg@redhat.com \
    --cc=paulus@samba.org \
    --cc=peterz@infradead.org \
    --cc=ralf@linux-mips.org \
    --cc=rostedt@goodmis.org \
    --cc=schwidefsky@de.ibm.com \
    --cc=serge@hallyn.com \
    --cc=sparclinux@vger.kernel.org \
    --cc=tglx@linutronix.de \
    --cc=tj@kernel.org \
    --cc=torvalds@linux-foundation.org \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.