WIP/fixbpf #13

已关闭
crtxcr 请求将 0 次代码提交从 WIP/fixbpf 合并至 master
所有者

TODO:

  • EACCES is hardcoded
  • Shrink BPF filter.
TODO: - EACCES is hardcoded - Shrink BPF filter.
crtxcr2021-08-12 12:31:00 +02:00 推送 3 个提交
We generally want to kill the process not the thread.
The filter was missing this check for arch, allowing bypasses
by using different calling conventions of other architectures.

A trivial example is execve() of x86 from and x86_64 process.
The arch field is the same for x86_64 and x32, thus checking it
is not enough.

Simply using x32 system calls would allow a bypass. Thus,
we must check whether the system call number is in __X32_SYSCALL_BIT.

This is of course a lazy solution, we could also add the
same system call number + _X32_SYSCALL_BIT to our black/whitelists.

For now however, this however will do.
crtxcr2021-09-05 12:32:25 +02:00 强制推送 WIP/fixbpf,从 89c5496fab83487c1699 比较
crtxcr2021-09-05 17:14:14 +02:00 强制推送 WIP/fixbpf,从 91a9b778eb8a9b1730de 比较
crtxcr2021-09-05 17:24:46 +02:00 推送 1 个提交
crtxcr2021-09-06 21:53:45 +02:00 推送 1 个提交
crtxcr2021-09-06 21:58:06 +02:00 关闭此合并请求

合并请求已关闭

登录 并参与到对话中。
无评审人
1 名参与者
通知
截止日期
未设置截止日期。
依赖工单

未设置依赖工单。

引用:crtxcr/exile.h#13