Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755389AbaFKD0O (ORCPT ); Tue, 10 Jun 2014 23:26:14 -0400 Received: from smtp.outflux.net ([198.145.64.163]:54524 "EHLO smtp.outflux.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751708AbaFKD0I (ORCPT ); Tue, 10 Jun 2014 23:26:08 -0400 From: Kees Cook To: linux-kernel@vger.kernel.org Cc: Kees Cook , Andy Lutomirski , Oleg Nesterov , Will Drewry , Julien Tinnes , David Drysdale , Alexei Starovoitov , John Johansen , Andrew Morton , x86@kernel.org, linux-arm-kernel@lists.infradead.org, linux-mips@linux-mips.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH v6 0/9] seccomp: add thread sync ability Date: Tue, 10 Jun 2014 20:25:12 -0700 Message-Id: <1402457121-8410-1-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 1.7.9.5 X-HELO: www.outflux.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [re-send with smaller CC list] This adds the ability for threads to request seccomp filter synchronization across their thread group (at filter attach time). For example, for Chrome to make sure graphic driver threads are fully confined after seccomp filters have been attached. To support this, locking on seccomp changes is introduced, along with refactoring of no_new_privs. Races with thread creation/death are handled via tasklist_lock. This includes a new syscall (instead of adding a new prctl option), as suggested by Andy Lutomirski and Michael Kerrisk. Thanks! -Kees v6: - switch from seccomp-specific lock to thread-group lock to gain atomicity - implement seccomp syscall across all architectures with seccomp filter - clean up sparse warnings around locking v5: - move includes around (drysdale) - drop set_nnp return value (luto) - use smp_load_acquire/store_release (luto) - merge nnp changes to seccomp always, fewer ifdef (luto) v4: - cleaned up locking further, as noticed by David Drysdale v3: - added SECCOMP_EXT_ACT_FILTER for new filter install options v2: - reworked to avoid clone races -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/