WIP/fixbpf #13

Dúnta
crtxcr ag iarraidh 0 gealltanas a chumasc ó WIP/fixbpf go master
Úinéir

TODO:

  • EACCES is hardcoded
  • Shrink BPF filter.
TODO: - EACCES is hardcoded - Shrink BPF filter.
crtxcr cuireadh 3 tiomantas 2021-08-12 12:31:00 +02:00 leis
We generally want to kill the process not the thread.
The filter was missing this check for arch, allowing bypasses
by using different calling conventions of other architectures.

A trivial example is execve() of x86 from and x86_64 process.
The arch field is the same for x86_64 and x32, thus checking it
is not enough.

Simply using x32 system calls would allow a bypass. Thus,
we must check whether the system call number is in __X32_SYSCALL_BIT.

This is of course a lazy solution, we could also add the
same system call number + _X32_SYSCALL_BIT to our black/whitelists.

For now however, this however will do.
crtxcr bhrú i bhfeidhm WIP/fixbpf ó 89c5496fab go 83487c1699 2021-09-05 12:32:25 +02:00 Déan comparáid
crtxcr bhrú i bhfeidhm WIP/fixbpf ó 91a9b778eb go 8a9b1730de 2021-09-05 17:14:14 +02:00 Déan comparáid
crtxcr Cuir 1 gealltanas 2021-09-05 17:24:46 +02:00 leis
crtxcr Cuir 1 gealltanas 2021-09-06 21:53:45 +02:00 leis
crtxcr dhún an t-iarratas tarraingthe seo 2021-09-06 21:58:06 +02:00

Iarratas tarraingthe dúnta

Sínigh isteach chun dul isteach sa chomhrá seo.
Gan Léirmheastóirí
Gan Chloch Mhíle
1 Rannpháirtithe
Fógraí
Dáta dlite
Níl aon dáta dlite socraithe.
Spleithiúlachtaí

Níl aon spleáchais leagtha síos.

Tagairt: crtxcr/exile.h#13
Níl aon tuairisc ar fáil.