From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757785Ab2ARTpa (ORCPT ); Wed, 18 Jan 2012 14:45:30 -0500 Received: from one.firstfloor.org ([213.235.205.2]:58435 "EHLO one.firstfloor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757349Ab2ARToV (ORCPT ); Wed, 18 Jan 2012 14:44:21 -0500 Date: Wed, 18 Jan 2012 20:44:20 +0100 From: Andi Kleen To: Linus Torvalds Cc: Andi Kleen , Indan Zupancic , Jamie Lokier , Andrew Lutomirski , Oleg Nesterov , Will Drewry , linux-kernel@vger.kernel.org, keescook@chromium.org, john.johansen@canonical.com, serge.hallyn@canonical.com, coreyb@linux.vnet.ibm.com, pmoore@redhat.com, eparis@redhat.com, djm@mindrot.org, segoon@openwall.com, rostedt@goodmis.org, jmorris@namei.org, scarybeasts@gmail.com, avi@redhat.com, penberg@cs.helsinki.fi, viro@zeniv.linux.org.uk, mingo@elte.hu, akpm@linux-foundation.org, khilman@ti.com, borislav.petkov@amd.com, amwang@redhat.com, ak@linux.intel.com, eric.dumazet@gmail.com, gregkh@suse.de, dhowells@redhat.com, daniel.lezcano@free.fr, linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, olofj@chromium.org, mhalcrow@google.com, dlaor@redhat.com, Roland McGrath Subject: Re: Compat 32-bit syscall entry from 64-bit task!? Message-ID: <20120118194420.GW11715@one.firstfloor.org> References: <20120118015013.GR11715@one.firstfloor.org> <20120118020453.GL7180@jl-vm1.vm.bytemark.co.uk> <20120118022217.GS11715@one.firstfloor.org> <20120118193602.GV11715@one.firstfloor.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.2i Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Umm. But the exact same is true of "LSM for custom jail". It's a > f*&^ing disaster, and it's a whole lot more complicated than ptrace. > > Plus it can't even do what ptrace does, so what's the point? There's It can securely enable syscall auditing which can catch all syscalls (however you only get race free memory arguments for the ones with LSM hooks at the right place). Really need both. I agree it's not easy to get tight (and also not pretty), but you have a lot better chance doing it this way than with ptrace. -Andi