How to compare string values with seccomp?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP












5















Some Linux system calls (such as execve, openat) have string type arguments. But the comparison function SCMP_CMP provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?










share|improve this question






















  • Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

    – Cyker
    Jan 2 at 19:58











  • Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

    – ilkkachu
    Jan 2 at 20:28











  • In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

    – ilkkachu
    Jan 2 at 20:31











  • According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

    – Mark Plotnick
    Jan 3 at 21:55











  • One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

    – Mark Plotnick
    Jan 3 at 22:06















5















Some Linux system calls (such as execve, openat) have string type arguments. But the comparison function SCMP_CMP provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?










share|improve this question






















  • Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

    – Cyker
    Jan 2 at 19:58











  • Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

    – ilkkachu
    Jan 2 at 20:28











  • In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

    – ilkkachu
    Jan 2 at 20:31











  • According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

    – Mark Plotnick
    Jan 3 at 21:55











  • One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

    – Mark Plotnick
    Jan 3 at 22:06













5












5








5


2






Some Linux system calls (such as execve, openat) have string type arguments. But the comparison function SCMP_CMP provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?










share|improve this question














Some Linux system calls (such as execve, openat) have string type arguments. But the comparison function SCMP_CMP provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?







linux syscalls






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 2 at 18:59









CykerCyker

1,45021531




1,45021531












  • Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

    – Cyker
    Jan 2 at 19:58











  • Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

    – ilkkachu
    Jan 2 at 20:28











  • In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

    – ilkkachu
    Jan 2 at 20:31











  • According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

    – Mark Plotnick
    Jan 3 at 21:55











  • One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

    – Mark Plotnick
    Jan 3 at 22:06

















  • Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

    – Cyker
    Jan 2 at 19:58











  • Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

    – ilkkachu
    Jan 2 at 20:28











  • In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

    – ilkkachu
    Jan 2 at 20:31











  • According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

    – Mark Plotnick
    Jan 3 at 21:55











  • One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

    – Mark Plotnick
    Jan 3 at 22:06
















Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

– Cyker
Jan 2 at 19:58





Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...

– Cyker
Jan 2 at 19:58













Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

– ilkkachu
Jan 2 at 20:28





Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".

– ilkkachu
Jan 2 at 20:28













In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

– ilkkachu
Jan 2 at 20:31





In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.

– ilkkachu
Jan 2 at 20:31













According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

– Mark Plotnick
Jan 3 at 21:55





According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.

– Mark Plotnick
Jan 3 at 21:55













One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

– Mark Plotnick
Jan 3 at 22:06





One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.

– Mark Plotnick
Jan 3 at 22:06










0






active

oldest

votes











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f492067%2fhow-to-compare-string-values-with-seccomp%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes















draft saved

draft discarded
















































Thanks for contributing an answer to Unix & Linux Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f492067%2fhow-to-compare-string-values-with-seccomp%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown






Popular posts from this blog

How to check contact read email or not when send email to Individual?

Bahrain

Postfix configuration issue with fips on centos 7; mailgun relay