All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v17 00/15] seccomp_filter: BPF-based syscall filtering
@ 2012-03-29 20:01 ` Will Drewry
  0 siblings, 0 replies; 146+ messages in thread
From: Will Drewry @ 2012-03-29 20:01 UTC (permalink / raw)
  To: linux-kernel
  Cc: linux-security-module, linux-arch, linux-doc, kernel-hardening,
	netdev, x86, arnd, davem, hpa, mingo, oleg, peterz, rdunlap,
	mcgrathr, tglx, luto, eparis, serge.hallyn, djm, scarybeasts,
	indan, pmoore, akpm, corbet, eric.dumazet, markus, coreyb,
	keescook, jmorris, Will Drewry

Please see prior revisions for a detailed discussion of this patch
series.

This series is a rebase on to:
  b5174fa3a7f4f8f150bfa3b917c92608953dfa0f
with very minor changes due to rebasing and tweaks noticed by a few
initial users.  (I will rebase again for v3.4-rc1 when that time comes.)

I realize now is a noisy time, but I wanted to get the most current
revision on the list.

As per prior posts, I am now including luto@'s PR_SET_NO_NEW_PRIVS
changes in the series for clarity and ease of testing.  This latest
rebased required required bumping the prctl() numbers for the
NO_NEW_PRIVS work due to the new reaper options.

For those inclined, the whole series can be found here too:
   https://github.com/redpig/linux/tree/seccomp

At this point, I'm not aware of any outstanding concerns, complaints,
etc. If there are any, I'd love to know.

Thanks!
will


Andy Lutomirski (1):
  Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs

John Johansen (1):
  Fix apparmor for PR_{GET,SET}_NO_NEW_PRIVS

Kees Cook (1):
  seccomp: remove duplicated failure logging

Will Drewry (12):
  sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
  net/compat.c,linux/filter.h: share compat_sock_fprog
  seccomp: kill the seccomp_t typedef
  arch/x86: add syscall_get_arch to syscall.h
  asm/syscall.h: add syscall_get_arch
  seccomp: add system call filtering using BPF
  seccomp: add SECCOMP_RET_ERRNO
  signal, x86: add SIGSYS info and make it synchronous.
  seccomp: Add SECCOMP_RET_TRAP
  ptrace,seccomp: Add PTRACE_SECCOMP support
  x86: Enable HAVE_ARCH_SECCOMP_FILTER
  Documentation: prctl/seccomp_filter

 Documentation/prctl/seccomp_filter.txt |  163 ++++++++++++
 arch/Kconfig                           |   24 ++
 arch/x86/Kconfig                       |    1 +
 arch/x86/ia32/ia32_signal.c            |    4 +
 arch/x86/include/asm/ia32.h            |    6 +
 arch/x86/include/asm/syscall.h         |   23 ++
 arch/x86/kernel/ptrace.c               |    7 +-
 fs/exec.c                              |   10 +-
 include/asm-generic/siginfo.h          |   22 ++
 include/asm-generic/syscall.h          |   14 +
 include/linux/Kbuild                   |    1 +
 include/linux/audit.h                  |    8 +-
 include/linux/filter.h                 |   12 +
 include/linux/prctl.h                  |   15 +
 include/linux/ptrace.h                 |    5 +-
 include/linux/sched.h                  |    4 +-
 include/linux/seccomp.h                |  105 +++++++-
 include/linux/security.h               |    1 +
 kernel/auditsc.c                       |   10 +-
 kernel/fork.c                          |    3 +
 kernel/seccomp.c                       |  447 ++++++++++++++++++++++++++++++--
 kernel/signal.c                        |    9 +-
 kernel/sys.c                           |   12 +-
 net/compat.c                           |    8 -
 net/core/filter.c                      |    6 +
 samples/Makefile                       |    2 +-
 samples/seccomp/Makefile               |   38 +++
 samples/seccomp/bpf-direct.c           |  176 +++++++++++++
 samples/seccomp/bpf-fancy.c            |  102 ++++++++
 samples/seccomp/bpf-helper.c           |   89 +++++++
 samples/seccomp/bpf-helper.h           |  238 +++++++++++++++++
 samples/seccomp/dropper.c              |   68 +++++
 security/apparmor/domain.c             |   35 +++
 security/commoncap.c                   |    7 +-
 security/selinux/hooks.c               |   10 +-
 35 files changed, 1628 insertions(+), 57 deletions(-)
 create mode 100644 Documentation/prctl/seccomp_filter.txt
 create mode 100644 samples/seccomp/Makefile
 create mode 100644 samples/seccomp/bpf-direct.c
 create mode 100644 samples/seccomp/bpf-fancy.c
 create mode 100644 samples/seccomp/bpf-helper.c
 create mode 100644 samples/seccomp/bpf-helper.h
 create mode 100644 samples/seccomp/dropper.c

-- 
1.7.5.4


^ permalink raw reply	[flat|nested] 146+ messages in thread

end of thread, other threads:[~2012-04-16 19:11 UTC | newest]

Thread overview: 146+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-03-29 20:01 [PATCH v17 00/15] seccomp_filter: BPF-based syscall filtering Will Drewry
2012-03-29 20:01 ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-04-06 19:49   ` Andrew Morton
2012-04-06 19:49     ` [kernel-hardening] " Andrew Morton
2012-04-06 19:55     ` Andy Lutomirski
2012-04-06 19:55       ` [kernel-hardening] " Andy Lutomirski
2012-04-06 19:55       ` Andy Lutomirski
2012-04-06 20:47     ` Markus Gutschke
2012-04-06 20:47       ` [kernel-hardening] " Markus Gutschke
2012-04-06 20:54       ` Andrew Lutomirski
2012-04-06 20:54         ` [kernel-hardening] " Andrew Lutomirski
2012-04-06 21:04         ` Markus Gutschke
2012-04-06 21:04           ` [kernel-hardening] " Markus Gutschke
2012-04-06 21:15           ` Andrew Lutomirski
2012-04-06 21:15             ` [kernel-hardening] " Andrew Lutomirski
2012-04-06 21:32             ` Markus Gutschke
2012-04-06 21:32               ` [kernel-hardening] " Markus Gutschke
2012-04-10 19:12     ` Will Drewry
2012-04-10 19:12       ` [kernel-hardening] " Will Drewry
2012-04-06 19:55   ` Andrew Morton
2012-04-06 19:55     ` [kernel-hardening] " Andrew Morton
2012-04-06 19:55     ` Andrew Morton
2012-04-06 20:01     ` Andrew Lutomirski
2012-04-06 20:01       ` [kernel-hardening] " Andrew Lutomirski
2012-04-06 20:28       ` Jonathan Corbet
2012-04-06 20:28         ` [kernel-hardening] " Jonathan Corbet
2012-04-06 20:37         ` Andrew Lutomirski
2012-04-06 20:37           ` [kernel-hardening] " Andrew Lutomirski
2012-04-11 19:31         ` Michael Kerrisk (man-pages)
2012-04-11 19:31           ` [kernel-hardening] " Michael Kerrisk (man-pages)
2012-04-12  0:15           ` Michael Kerrisk (man-pages)
2012-04-12  0:15             ` [kernel-hardening] " Michael Kerrisk (man-pages)
2012-04-12  0:50           ` Andrew Lutomirski
2012-04-12  0:50             ` [kernel-hardening] " Andrew Lutomirski
2012-04-16 19:11           ` Rob Landley
2012-04-16 19:11             ` [kernel-hardening] " Rob Landley
2012-04-10 20:37       ` Rob Landley
2012-04-10 20:37         ` [kernel-hardening] " Rob Landley
2012-04-10 19:03     ` Will Drewry
2012-04-10 19:03       ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 02/15] Fix apparmor for PR_{GET,SET}_NO_NEW_PRIVS Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 03/15] sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 04/15] net/compat.c,linux/filter.h: share compat_sock_fprog Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 05/15] seccomp: kill the seccomp_t typedef Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 06/15] arch/x86: add syscall_get_arch to syscall.h Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 07/15] asm/syscall.h: add syscall_get_arch Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-04-06 20:05   ` Andrew Morton
2012-04-06 20:05     ` [kernel-hardening] " Andrew Morton
2012-04-09 19:24     ` Will Drewry
2012-04-09 19:24       ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 08/15] seccomp: add system call filtering using BPF Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-31  4:40   ` Vladimir Murzin
2012-03-31  4:40     ` [kernel-hardening] " Vladimir Murzin
2012-03-31 18:14     ` Will Drewry
2012-03-31 18:14       ` [kernel-hardening] " Will Drewry
2012-04-06 20:23   ` Andrew Morton
2012-04-06 20:23     ` [kernel-hardening] " Andrew Morton
2012-04-06 20:44     ` Kees Cook
2012-04-06 20:44       ` [kernel-hardening] " Kees Cook
2012-04-06 21:05       ` Andrew Morton
2012-04-06 21:05         ` [kernel-hardening] " Andrew Morton
2012-04-06 21:06         ` H. Peter Anvin
2012-04-06 21:06           ` [kernel-hardening] " H. Peter Anvin
2012-04-06 21:09           ` Andrew Morton
2012-04-06 21:09             ` [kernel-hardening] " Andrew Morton
2012-04-08 18:22     ` Indan Zupancic
2012-04-08 18:22       ` [kernel-hardening] " Indan Zupancic
2012-04-09 19:59       ` Will Drewry
2012-04-09 19:59         ` [kernel-hardening] " Will Drewry
2012-04-10  9:48         ` James Morris
2012-04-10  9:48           ` [kernel-hardening] " James Morris
2012-04-10 20:00         ` Andrew Morton
2012-04-10 20:00           ` [kernel-hardening] " Andrew Morton
2012-04-10 20:16           ` Will Drewry
2012-04-10 20:16             ` [kernel-hardening] " Will Drewry
2012-04-10 20:16             ` Will Drewry
2012-04-10 10:34       ` Eric Dumazet
2012-04-10 10:34         ` [kernel-hardening] " Eric Dumazet
2012-04-10 19:54       ` Andrew Morton
2012-04-10 19:54         ` [kernel-hardening] " Andrew Morton
2012-04-10 20:15         ` Will Drewry
2012-04-10 20:15           ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 09/15] seccomp: remove duplicated failure logging Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-04-06 21:14   ` Andrew Morton
2012-04-06 21:14     ` [kernel-hardening] " Andrew Morton
2012-04-09 19:26     ` Will Drewry
2012-04-09 19:26       ` [kernel-hardening] " Will Drewry
2012-04-09 19:26       ` Will Drewry
2012-04-09 19:32       ` Kees Cook
2012-04-09 19:32         ` [kernel-hardening] " Kees Cook
2012-04-09 19:33       ` Eric Paris
2012-04-09 19:33         ` Eric Paris
2012-04-09 19:39         ` [kernel-hardening] " Kees Cook
2012-04-09 19:39           ` Kees Cook
2012-03-29 20:01 ` [PATCH v17 10/15] seccomp: add SECCOMP_RET_ERRNO Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-04-06 21:19   ` Andrew Morton
2012-04-06 21:19     ` [kernel-hardening] " Andrew Morton
2012-04-09 19:19     ` Will Drewry
2012-04-09 19:19       ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 11/15] signal, x86: add SIGSYS info and make it synchronous Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 12/15] seccomp: Add SECCOMP_RET_TRAP Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 13/15] ptrace,seccomp: Add PTRACE_SECCOMP support Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-04-06 21:24   ` Andrew Morton
2012-04-06 21:24     ` [kernel-hardening] " Andrew Morton
2012-04-09 19:38     ` Will Drewry
2012-04-09 19:38       ` [kernel-hardening] " Will Drewry
2012-03-29 20:01 ` [PATCH v17 14/15] x86: Enable HAVE_ARCH_SECCOMP_FILTER Will Drewry
2012-03-29 20:01   ` [kernel-hardening] " Will Drewry
2012-03-29 20:02 ` [PATCH v17 15/15] Documentation: prctl/seccomp_filter Will Drewry
2012-03-29 20:02   ` [kernel-hardening] " Will Drewry
2012-04-06 21:26   ` Andrew Morton
2012-04-06 21:26     ` [kernel-hardening] " Andrew Morton
2012-04-09 19:46     ` Will Drewry
2012-04-09 19:46       ` [kernel-hardening] " Will Drewry
2012-04-09 20:47       ` Markus Gutschke
2012-04-09 20:47         ` [kernel-hardening] " Markus Gutschke
2012-04-09 20:58         ` Ryan Ware
2012-04-09 20:58           ` [kernel-hardening] " Ryan Ware
2012-04-09 20:58           ` Ryan Ware
2012-04-09 22:47           ` Will Drewry
2012-04-09 22:47             ` [kernel-hardening] " Will Drewry
2012-04-10 17:49             ` Ryan Ware
2012-04-10 17:49               ` [kernel-hardening] " Ryan Ware
2012-04-10 17:49               ` Ryan Ware
2012-03-29 23:11 ` [PATCH v17 00/15] seccomp_filter: BPF-based syscall filtering James Morris
2012-03-29 23:11   ` [kernel-hardening] " James Morris
2012-04-06 21:28   ` Andrew Morton
2012-04-06 21:28     ` [kernel-hardening] " Andrew Morton
2012-04-06 21:28     ` Andrew Morton
2012-04-09  3:48     ` James Morris
2012-04-09  3:48       ` [kernel-hardening] " James Morris
2012-04-09  3:48       ` James Morris

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.