Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2001281pxu; Tue, 24 Nov 2020 14:25:06 -0800 (PST) X-Google-Smtp-Source: ABdhPJyDe5T7DUYjydX/3fjOFmVXxRy0eF2gb/i4DoDYIO/zvXM6vMCTV3b5t64hBbzKYV8uOai2 X-Received: by 2002:aa7:c049:: with SMTP id k9mr655871edo.49.1606256706053; Tue, 24 Nov 2020 14:25:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606256706; cv=none; d=google.com; s=arc-20160816; b=WtiPCISuQHkqGV97KqMNtDyYlYZgpji5sXbrxXndZSo4MnK7MoT/+KT0tlzTgg9vvU WL1qHTNQYjoiwCTrzq0O2+0WWWXdLq4M4VMHBEUOw5RseVM85zVPoyqOwvFk5ycsEFE9 /NfJ+hf6wT4YaHz89aqgWIBWkWr2+ZKSowRu37nvBfQSUD0uZM20f5PI+0QGq0Giv/Lq Z/Pycy5K5hibR8zO8AYZLDjMyKYYL3liFX3L3H307DhgMXFkdUYhkN4wrOfEqW3aAFxl 7tqxOatAAhCw0NeH3J1gDwvYN9RhW23QR09WNBUSEaVbEyhy+LCjqU/6jEZ8iZ+7GLLl wrag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:subject:cc:to:from:dkim-signature; bh=yXy3ecs+HX3+K1WnKeyew4ESrbgIT3k+SY8QKhWbc6I=; b=roXjpbWzJs6p8fSZ5IEYQTulChukrogBcxvFi/IPivVBmn/xKp1Ae0knx1ZgPjtH36 FVJ2yTtFUyFpIKyUeLknoNCOhrdYw+RxDyUtF3+VUqrT1LDznc/kcdQn2Ow5IPU6vV8z HnpzvZw/0dbiYihKvWs7k5NG4SlKTrRrmr7VvNy6p3MTyY8vFVXkYFr8FAnr5ndDorYG 9vQPk33uf9jIMHRdKmECSO/leiKFThRGlUhFCWNLSF65LQ11A88qFJ6VZP6YQDi9iZQ4 YU7d9/Yp7Xe1DxwtTLfHRFEkjs081YgEDx91rNH6Uwo7wfG4aBu/eFDMZOva6cke39sC D38A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GanuzxtU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cq14si48465edb.516.2020.11.24.14.24.43; Tue, 24 Nov 2020 14:25:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GanuzxtU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730069AbgKXOIX (ORCPT + 99 others); Tue, 24 Nov 2020 09:08:23 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:53410 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727359AbgKXOIW (ORCPT ); Tue, 24 Nov 2020 09:08:22 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1606226902; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=yXy3ecs+HX3+K1WnKeyew4ESrbgIT3k+SY8QKhWbc6I=; b=GanuzxtU76kmiYnwjcmbO67QC7bnzhFSlpiDmKYuNm37uHiCgiH5tlrnYgmyUIrBZd2d8E Edtt7rHSot1PyORRAjh3E5cspMF2kfCa8jRc46+EZ9MvtHXJGJzxd+h3+/XBNJmvGy7dke RTEP64JcB0lyPCbCTMN32aFJrn56XZk= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-448-HGYUlOEvNEKCDrCaB02O6Q-1; Tue, 24 Nov 2020 09:08:17 -0500 X-MC-Unique: HGYUlOEvNEKCDrCaB02O6Q-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 0E3D1107ACFE; Tue, 24 Nov 2020 14:08:16 +0000 (UTC) Received: from oldenburg2.str.redhat.com (ovpn-112-141.ams2.redhat.com [10.36.112.141]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 741335D71B; Tue, 24 Nov 2020 14:08:11 +0000 (UTC) From: Florian Weimer To: Christoph Hellwig Cc: linux-api@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, dev@opencontainers.org, corbet@lwn.net, Carlos O'Donell Subject: Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround References: <87lfer2c0b.fsf@oldenburg2.str.redhat.com> <20201124133719.GA30896@infradead.org> Date: Tue, 24 Nov 2020 15:08:09 +0100 In-Reply-To: <20201124133719.GA30896@infradead.org> (Christoph Hellwig's message of "Tue, 24 Nov 2020 13:37:19 +0000") Message-ID: <87k0ua26gm.fsf@oldenburg2.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Christoph Hellwig: > On Tue, Nov 24, 2020 at 01:08:20PM +0100, Florian Weimer wrote: >> This documents a way to safely use new security-related system calls >> while preserving compatibility with container runtimes that require >> insecure emulation (because they filter the system call by default). >> Admittedly, it is somewhat hackish, but it can be implemented by >> userspace today, for existing system calls such as faccessat2, >> without kernel or container runtime changes. > > I think this is completely insane. Tell the OCI folks to fix their > completely broken specification instead. Do you categorically reject the general advice, or specific instances as well? Like this workaround for faccessat that follows the pattern I outlined: I value your feedback and want to make sure I capture it accurately. Thanks, Florian -- Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn, Commercial register: Amtsgericht Muenchen, HRB 153243, Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'Neill