kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
* [kernel-hardening] seccomp and ptrace. what is the correct order?
@ 2012-05-21 18:21 Eric Paris
  2012-05-21 18:25 ` [kernel-hardening] " Roland McGrath
  2012-05-21 18:47 ` [kernel-hardening] Re: seccomp and ptrace. what is the correct order? richard -rw- weinberger
  0 siblings, 2 replies; 39+ messages in thread
From: Eric Paris @ 2012-05-21 18:21 UTC (permalink / raw)
  To: Will Drewry
  Cc: linux-kernel, linux-security-module, kernel-hardening, hpa, mingo,
	oleg, peterz, rdunlap, mcgrathr, tglx, luto, eparis, serge.hallyn,
	indan, pmoore, akpm, corbet, eric.dumazet, markus, coreyb,
	keescook

Viro ask me a question today and I didn't have a good answer.

Lets assume I set a seccomp filter that will allow read and will
deny/kill ioctl.  If something else is tracing me I could call read.
The read will pass the seccomp hook and move onto the ptrace hook.
The tracer could then change the syscall number to ioctl and I would
then actually perform an ioctl.

Is that what we want?  Do we want to do the permission check based on
what a process ask at syscall enter or do we want to do the permission
check based on what the kernel is actually going to do on behalf of
the process?

Does the question make sense?

-Eric

^ permalink raw reply	[flat|nested] 39+ messages in thread

end of thread, other threads:[~2012-05-25  1:55 UTC | newest]

Thread overview: 39+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-05-21 18:21 [kernel-hardening] seccomp and ptrace. what is the correct order? Eric Paris
2012-05-21 18:25 ` [kernel-hardening] " Roland McGrath
2012-05-21 18:40   ` Andrew Lutomirski
2012-05-21 19:20   ` Indan Zupancic
2012-05-22 16:23     ` Will Drewry
2012-05-22 16:26       ` Will Drewry
2012-05-22 17:39       ` Al Viro
2012-05-22 20:26         ` Will Drewry
2012-05-22 20:34           ` H. Peter Anvin
2012-05-22 20:48             ` Will Drewry
2012-05-22 21:07               ` Al Viro
2012-05-22 21:17                 ` Roland McGrath
2012-05-22 21:18                   ` H. Peter Anvin
2012-05-22 22:20                   ` Al Viro
2012-05-22 21:09               ` H. Peter Anvin
2012-05-22 21:14                 ` Will Drewry
2012-05-22 21:37                   ` H. Peter Anvin
2012-05-24 16:07         ` [kernel-hardening] [RFC PATCH 0/3] move the secure_computing call Will Drewry
2012-05-24 16:07           ` [kernel-hardening] [RFC PATCH 1/3] seccomp: Don't allow tracers to abuse RET_TRACE Will Drewry
2012-05-24 17:54             ` [kernel-hardening] " Indan Zupancic
2012-05-24 18:24               ` Will Drewry
2012-05-24 20:17                 ` Indan Zupancic
2012-05-24 16:08           ` [kernel-hardening] [RFC PATCH 2/3] arch/x86: move secure_computing after ptrace Will Drewry
2012-05-24 16:08           ` [kernel-hardening] [RFC PATCH 3/3] arch/*: move secure_computing after trace Will Drewry
2012-05-24 16:13           ` [kernel-hardening] Re: [RFC PATCH 0/3] move the secure_computing call H. Peter Anvin
2012-05-24 18:07             ` Roland McGrath
2012-05-24 18:27               ` Indan Zupancic
2012-05-24 18:45                 ` H. Peter Anvin
2012-05-24 19:39                   ` Indan Zupancic
2012-05-24 22:00           ` Andrew Morton
2012-05-25  1:55             ` Will Drewry
2012-05-24 23:40           ` James Morris
2012-05-24 23:43             ` Andrew Lutomirski
2012-05-24 23:56               ` H. Peter Anvin
2012-05-25  0:26                 ` Andrew Lutomirski
2012-05-25  0:38                   ` H. Peter Anvin
2012-05-25  0:55                     ` Andrew Lutomirski
2012-05-21 18:47 ` [kernel-hardening] Re: seccomp and ptrace. what is the correct order? richard -rw- weinberger
2012-05-21 19:13   ` H. Peter Anvin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).