Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering

2011-05-14 Thread Ingo Molnar
* Peter Zijlstra pet...@infradead.org wrote: On Fri, 2011-05-13 at 16:57 +0200, Ingo Molnar wrote: this is a security mechanism Who says? [...] Kernel developers/maintainers of the affected code. We have security hooks all around the kernel, which can deny/accept execution at various

Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering

2011-05-14 Thread Will Drewry
On Sat, May 14, 2011 at 2:30 AM, Ingo Molnar mi...@elte.hu wrote: * Eric Paris epa...@redhat.com wrote: [dropping microblaze and roland] lOn Fri, 2011-05-13 at 14:10 +0200, Ingo Molnar wrote: * James Morris jmor...@namei.org wrote: It is a simple and sensible security feature, agreed?

linux kernel reference to non-existent CONFIG_FSL_85XX_CACHE_SRAM

2011-05-14 Thread Robert P. J. Day
the current kernel source tree contains a Makefile reference to the above Kconfig variable that doesn't appear to be defined anywhere. rday -- Robert P. J. Day Ottawa, Ontario, CANADA

Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering

2011-05-14 Thread Arnd Bergmann
On Thursday 12 May 2011, Will Drewry wrote: This change adds a new seccomp mode based on the work by a...@chromium.org in [1]. This new mode, filter mode, provides a hash table of seccomp_filter objects. When in the new mode (2), all system calls are checked against the filters - first by

Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering

2011-05-14 Thread Will Drewry
On Fri, May 13, 2011 at 2:35 PM, Arnd Bergmann a...@arndb.de wrote: On Thursday 12 May 2011, Will Drewry wrote: This change adds a new seccomp mode based on the work by a...@chromium.org in [1]. This new mode, filter mode, provides a hash table of seccomp_filter objects.  When in the new mode