Date: Thu, 01 Mar 2012 21:52:59 -0800 From: "H. Peter Anvin" <hpa@...or.com> To: Indan Zupancic <indan@....nu> CC: Will Drewry <wad@...omium.org>, linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org, linux-doc@...r.kernel.org, kernel-hardening@...ts.openwall.com, netdev@...r.kernel.org, x86@...nel.org, arnd@...db.de, davem@...emloft.net, mingo@...hat.com, oleg@...hat.com, peterz@...radead.org, rdunlap@...otime.net, mcgrathr@...omium.org, tglx@...utronix.de, luto@....edu, eparis@...hat.com, serge.hallyn@...onical.com, djm@...drot.org, scarybeasts@...il.com, pmoore@...hat.com, akpm@...ux-foundation.org, corbet@....net, eric.dumazet@...il.com, markus@...omium.org, coreyb@...ux.vnet.ibm.com, keescook@...omium.org Subject: Re: [PATCH v12 06/13] seccomp: add system call filtering using BPF On 03/01/2012 09:45 PM, Indan Zupancic wrote: > >> + * @nr: the system call number >> + * @arch: indicates system call convention as an AUDIT_ARCH_* value >> + * as defined in <linux/audit.h>. >> + * @instruction_pointer: at the time of the system call. > > If the vDSO is used this will always be the same, so what good is this? > I haven't gotten an answer to this yet. > And if it isn't, or you're on an architecture which doesn't use the vdso as the launching point, it's not. You seem to be unable to look outside your own particular use cases, but it is very likely that the same oddball cases which do mixed-mode programming are ones for which this kind of filtering facility would be extremely useful -- Pin is a great example. -hpa -- H. Peter Anvin, Intel Open Source Technology Center I work for Intel. I don't speak on their behalf.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.