Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2342798ima; Thu, 25 Oct 2018 13:37:41 -0700 (PDT) X-Google-Smtp-Source: AJdET5di4eKiyuWXoTNeRPPc2j/CcljXW44ymOg1ZcN9giA4sAhpjdez9Mcr1f5TLOZ161d+PkZt X-Received: by 2002:a63:510a:: with SMTP id f10-v6mr632121pgb.31.1540499861015; Thu, 25 Oct 2018 13:37:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540499860; cv=none; d=google.com; s=arc-20160816; b=Z5ZVt3CoK7PaXkiF0hl1FPa9kHgO0wswooBElWrZpPfm8gn3X7g9VZzlW/djQGEsxU W0VKJN/jvpE48k+b4o9rAphwgFlGGayzqGh6WfZmiPSXT0pyIh2z5UlOAmHLHH+Aytgc yyCVttaWrvwe4xEqqEduJLoR8Ts9RBfZabMgbrxa2vFrQ3AkV8ajz8d0ItiJCKKgJVQe utrGNhTdpHeZ86BTzCqM4Lh8zwkhls0ZlI5OqX2GzE34kj24CAuO9IUwq5mVzhMcYy56 UhoaVzWWgduto22/9cA7D5pyP8mV1gq0DndHUs/+w2bd38auX68nEGsjn+g0xwOQ43lh LMXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=qwqH7ghNRicmHmNn8jgoDXxPtuAHgcO+Zu5ALu+7dIc=; b=zS5zMhi/irDFqqPEI1vTsOf6gkO70Z+5m0SdmgtEOfztgSOMTeq2P1lj62ZHWY7x9r 4OabEsPjLQFf2c3FTpa/0jFkhLrS2TtI4d6Y+W1FfEf/zxybth6p0OBDIaonFesaD+2d hj92nCoG1QwgvLNWAQ3zdv8vn1evPTjsQ4JDpIrupCkJIRMuFLVeBF3eeNiplzZotLqC rpY1/u7wue+fZRlxIRir5IEKNA2tGjFKNo31e/fKSI3K2AfH8LdFdZjdAS9BqixmxJfI ASFRuFHkAfEy5tFpByZpafTaf4xII4CU/XNvHKZajjIQVX1v2ORNWc6bGrxqIUrbQQGq vZKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=UQvFa6o8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t64-v6si9134425pfa.170.2018.10.25.13.37.24; Thu, 25 Oct 2018 13:37:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=UQvFa6o8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725950AbeJZFLI (ORCPT + 99 others); Fri, 26 Oct 2018 01:11:08 -0400 Received: from mail-lf1-f66.google.com ([209.85.167.66]:34895 "EHLO mail-lf1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725842AbeJZFLI (ORCPT ); Fri, 26 Oct 2018 01:11:08 -0400 Received: by mail-lf1-f66.google.com with SMTP id d7-v6so7859435lfi.2 for ; Thu, 25 Oct 2018 13:36:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qwqH7ghNRicmHmNn8jgoDXxPtuAHgcO+Zu5ALu+7dIc=; b=UQvFa6o8oFPjOEiJSKFKSTdILmiF+kjVao6/040Fpqp79qCxtTkkDV2CxL75qegIlH eP9kU1GGu9nX/Oi8oow3/iHcQdWWYuoxgqxv0PUZM26QjV9Yj7CRPftujB3VM5WaESIs VjA2Z4aq/QpFu9892sE3wcKMpptnvx+JftvBrJnXbC7W5/L6LdFWB/HqRasPsFhE+UW3 hyB9CANtd22SZhR6kNShl+bel4AidQ2VK2PXfl4immH37h+apFy2lKItsKyYznIjcfJz QQ/0wbxYKzyJDd3N3lRJwObNpPHZeN0eLfRSrd3WJ5NRkrKcAY49QkCH5lXxlw/R247k TBGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qwqH7ghNRicmHmNn8jgoDXxPtuAHgcO+Zu5ALu+7dIc=; b=abzXSjFJITZ/TvjL5Wcz8MJ4e/c/DkOErvUV6wWmZZfvo4aNTWfu6aMv3MsAojCkI7 qIK5sZxZ7fJf77pAm56nub95gJkchbrz37BWDnoqb2khsMWwxktelY8Twf6g511S54CN 66+PesUsBUGvoYDiUsQLTb+Zb7HWr1jQ2H3eqxRmHIFjRyXnS3tuGxT5NWkoNXIjjnni RCpNDFxFgZcX+NWSp78iNau66Z7CK37VbQNFT+fx/Men/uBBlbVc6x8sNwd+PAzWd2Yc xZsq5uYpA0dZGIkCOHxdZYCdW+mK8fDLkbd6GJ/wLnJ68daJ+P95UvqUqBwU3NpOkY7H 5XDA== X-Gm-Message-State: AGRZ1gKO+XniO6gN/Nu6iUOtQkBB/4OAB9gWU5DzKGfwdSyLU36GAXJJ ce5CursiiTB9v1bD8bsRKctdUsS9V5tpV37AjNDT X-Received: by 2002:a19:e601:: with SMTP id d1mr455742lfh.71.1540499812266; Thu, 25 Oct 2018 13:36:52 -0700 (PDT) MIME-Version: 1.0 References: <20181024204036.8799-1-palmer@sifive.com> <20181024204036.8799-3-palmer@sifive.com> In-Reply-To: From: Paul Moore Date: Thu, 25 Oct 2018 16:36:41 -0400 Message-ID: Subject: Re: [PATCH 2/2] RISC-V: Add support for SECCOMP To: david.abdurachmanov@gmail.com Cc: palmer@sifive.com, linux-riscv@lists.infradead.org, aou@eecs.berkeley.edu, Eric Paris , keescook@chromium.org, luto@amacapital.net, wad@chromium.org, wesley@sifive.com, dhowells@redhat.com, tglx@linutronix.de, pombredanne@nexb.com, gregkh@linuxfoundation.org, kstewart@linuxfoundation.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 25, 2018 at 2:31 PM David Abdurachmanov wrote: > On Wed, Oct 24, 2018 at 10:40 PM Palmer Dabbelt wrote: > > From: "Wesley W. Terpstra" ... > Palmer, > > Half of the patch seems to touch audit parts. I started working on audit > support this morning, and I can boot Fedora with audit traces. > > [root@fedora-riscv ~]# dmesg | grep audit > [ 0.312000] audit: initializing netlink subsys (disabled) > [ 0.316000] audit: type=2000 audit(0.316:1): state=initialized > audit_enabled=0 res=1 > [ 7.288000] audit: type=1130 audit(1529665913.772:2): pid=1 uid=0 > auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs > comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? > terminal=? res=success' > [ 7.684000] audit: type=1130 audit(1529665914.176:3): pid=1 uid=0 > auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" > exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? > res=success' > [..] > > I am still working on audit user-space support for better testing. > > I suggest we first implement audit and then seccomp. FYI, while small and far from comprehensive, we do have a test suite we use for basic validation of the audit kernel bits which may be helpful while you're working on the audit enablement: * https://github.com/linux-audit/audit-testsuite -- paul moore www.paul-moore.com