* David Alan Gilbert:
> * Florian Weimer (fwei...@redhat.com) wrote:
>> * David Alan Gilbert:
>>
>> > +static const int syscall_whitelist[] = {
>> > +/* TODO ireg sem*() syscalls */
>> > +SCMP_SYS(brk),
>> > +SCMP_SYS(capget), /* For CAP_FSETID */
>> > +SCMP_SYS(capset),
>> > +
* Florian Weimer (fwei...@redhat.com) wrote:
> * David Alan Gilbert:
>
> > +static const int syscall_whitelist[] = {
> > +/* TODO ireg sem*() syscalls */
> > +SCMP_SYS(brk),
> > +SCMP_SYS(capget), /* For CAP_FSETID */
> > +SCMP_SYS(capset),
> > +SCMP_SYS(clock_gettime),
>
> >
* Florian Weimer (fwei...@redhat.com) wrote:
> * David Alan Gilbert:
>
> > +static const int syscall_whitelist[] = {
> > +/* TODO ireg sem*() syscalls */
> > +SCMP_SYS(brk),
> > +SCMP_SYS(capget), /* For CAP_FSETID */
> > +SCMP_SYS(capset),
> > +SCMP_SYS(clock_gettime),
>
> >
* David Alan Gilbert:
> +static const int syscall_whitelist[] = {
> +/* TODO ireg sem*() syscalls */
> +SCMP_SYS(brk),
> +SCMP_SYS(capget), /* For CAP_FSETID */
> +SCMP_SYS(capset),
> +SCMP_SYS(clock_gettime),
> +SCMP_SYS(gettimeofday),
Is this to suppose to work on
On 1/21/20 8:49 PM, Dr. David Alan Gilbert wrote:
* Philippe Mathieu-Daudé (phi...@redhat.com) wrote:
On 1/21/20 1:23 PM, Dr. David Alan Gilbert (git) wrote:
From: Stefan Hajnoczi
Only allow system calls that are needed by virtiofsd. All other system
calls cause SIGSYS to be directed at the
* Philippe Mathieu-Daudé (phi...@redhat.com) wrote:
> On 1/21/20 1:23 PM, Dr. David Alan Gilbert (git) wrote:
> > From: Stefan Hajnoczi
> >
> > Only allow system calls that are needed by virtiofsd. All other system
> > calls cause SIGSYS to be directed at the thread and the process will
> >
On 1/21/20 1:23 PM, Dr. David Alan Gilbert (git) wrote:
From: Stefan Hajnoczi
Only allow system calls that are needed by virtiofsd. All other system
calls cause SIGSYS to be directed at the thread and the process will
coredump.
Restricting system calls reduces the kernel attack surface and
From: Stefan Hajnoczi
Only allow system calls that are needed by virtiofsd. All other system
calls cause SIGSYS to be directed at the thread and the process will
coredump.
Restricting system calls reduces the kernel attack surface and limits
what the process can do when compromised.