How to compare string values with seccomp?
Clash Royale CLAN TAG#URR8PPP
Some Linux system calls (such as execve
, openat
) have string type arguments. But the comparison function SCMP_CMP
provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?
linux syscalls
add a comment |
Some Linux system calls (such as execve
, openat
) have string type arguments. But the comparison function SCMP_CMP
provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?
linux syscalls
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06
add a comment |
Some Linux system calls (such as execve
, openat
) have string type arguments. But the comparison function SCMP_CMP
provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?
linux syscalls
Some Linux system calls (such as execve
, openat
) have string type arguments. But the comparison function SCMP_CMP
provided by seccomp seems to be comparing two pointers. So how can I limit files that can be opened by a process to a specific dir using seccomp? Is there a way for users to provide a general comparison function?
linux syscalls
linux syscalls
asked Jan 2 at 18:59
CykerCyker
1,45021531
1,45021531
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06
add a comment |
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f492067%2fhow-to-compare-string-values-with-seccomp%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f492067%2fhow-to-compare-string-values-with-seccomp%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Hmm, why do some people suggest this question doesn't fit here, given the fact that seccomp is built in the Linux kernel...
– Cyker
Jan 2 at 19:58
Ho hum, I would have thought this to be on-topic, based on the "C API and system interfaces" point in the help page, and the fact that it's specific to an OS that matches the description "Unix & Linux". But apparently the consensus on the discussion in meta is that interfaces like that aren't on-topic since "only programmers see them".
– ilkkachu
Jan 2 at 20:28
In any case, there's even a tag for seccomp on stackoverflow, so chances are there's someone there who knows something about it.
– ilkkachu
Jan 2 at 20:31
According to this talk (at the 8 minute mark) from a few months ago, pointer dereferencing in seccomp bpf is not yet possible, but is being worked on.
– Mark Plotnick
Jan 3 at 21:55
One issue with trying to read process memory as a security check is that there's a TOCTOU race if you have multiple threads or shared/ mmapped memory.
– Mark Plotnick
Jan 3 at 22:06