WIP/fixbpf #13

已关闭
crtxcr 请求将 0 次代码提交从 WIP/fixbpf 合并至 master
管理员

TODO:

  • EACCES is hardcoded
  • Shrink BPF filter.
TODO: - EACCES is hardcoded - Shrink BPF filter.
crtxcr2021-08-12 12:31:00 +02:00 推送了 3 个提交
5cd45c09b7 bpf: Use SECCOMP_RET_KILL_PROCESS instead SECCOMP_RET_KILL
We generally want to kill the process not the thread.
66c6d28dcd bpf: Check arch value
The filter was missing this check for arch, allowing bypasses
by using different calling conventions of other architectures.

A trivial example is execve() of x86 from and x86_64 process.
51844ea3ab bpf: Deny x32 system calls for now
The arch field is the same for x86_64 and x32, thus checking it
is not enough.

Simply using x32 system calls would allow a bypass. Thus,
we must check whether the system call number is in __X32_SYSCALL_BIT.

This is of course a lazy solution, we could also add the
same system call number + _X32_SYSCALL_BIT to our black/whitelists.

For now however, this however will do.
crtxcr2021-09-05 12:32:25 +02:00 强制推送 WIP/fixbpf,从 89c5496fab,至 83487c1699 比较
crtxcr2021-09-05 17:14:14 +02:00 强制推送 WIP/fixbpf,从 91a9b778eb,至 8a9b1730de 比较
crtxcr2021-09-05 17:24:46 +02:00 推送了 1 个提交
crtxcr2021-09-06 21:53:45 +02:00 推送了 1 个提交
crtxcr "于 2021-09-06 21:58:06 +02:00 关闭此合并请求 "

合并请求已关闭

登录 并参与到对话中。
无审核者
未选择里程碑
未指派成员
1 名参与者
通知
到期时间
到期日期无效或超出范围。请使用 'yyyy-mm-dd' 格式。

未设置到期时间。

依赖工单

没有设置依赖项。

参考:crtxcr/exile.h#13
没有提供说明。