Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp4591858pxb; Sat, 12 Feb 2022 10:23:06 -0800 (PST) X-Google-Smtp-Source: ABdhPJw0xuSqe0GwHT4WgO3a3dTCwK+37e9J1pl8rKhMEoKG7Pm1qo5B7rPhIIeVQLoPdusmpfC5 X-Received: by 2002:a17:902:780d:: with SMTP id p13mr6979892pll.32.1644690185917; Sat, 12 Feb 2022 10:23:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644690185; cv=none; d=google.com; s=arc-20160816; b=QL0SwIrRZWnVZ8FF2jGAJI7BQGUIb6Kmf19totOQUwjUO/rAt6JvG2jemEffRGSBTc xaW4yKjIenuQZWYdFq1vrtNOkjOKRYXrHKXt4BpKI21XdcrkmQHDXch79HqzYJvFraZl k6SsgCUdlj+9wblALiJArT8l+BWjXipMKFnafEWZ49WP2LMTT61MsRkv4EOKk4ARc/Jq a0kSVLhVNFWuHS+7eQ9yhb4Z54XCcK1aX99AYcUYWAQof8Me0MvG3yymqV2pRg6sRr8r qbFcWt+zAtD6rY0KnpKw1jfCZSoT7RaxckmJc9bQTXyqpRAomBirSlrqhDC+MLHYZbXq gdCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=QMVVkjMchB0s/a3beZw7NTzCf3sxBDL51mOIwpD203k=; b=uiB1VmBuJDOyeDP2mFsJaX8cJaddo61KQ/b/9vZQb7tfKtatdNlyjdfHILV7P8lh3H YO0uVjI6NaimnQapysQdVRkK96WCSqCZhUAZ80tt7t58VqClw2zv3xTdVQ5608RHQIdF ej+/f4YQu8zfIzu056ygrvuyaJhd8FVDPCDM/NuIq9+13VBE0lGhSwi0G37XB6rK8IjC HorHxQ4ksU0UfIgPQTWFDH6Lw+rBmW7Gvk3gsLZqws1aW7yuOZtJUFKHOL1t8RRDmX3S osLvdOHSzOZdrLnT59xgPL52xc4OtTy0CTvxZpCzlD6S7gOOqVrG1jE1rSB2+K6+Ke8g 6/nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@swiecki.net header.s=google header.b=GL0LgTUP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n15si4798092plh.279.2022.02.12.10.22.53; Sat, 12 Feb 2022 10:23:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@swiecki.net header.s=google header.b=GL0LgTUP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236002AbiBKS5W (ORCPT + 93 others); Fri, 11 Feb 2022 13:57:22 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:33786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235421AbiBKS5U (ORCPT ); Fri, 11 Feb 2022 13:57:20 -0500 Received: from mail-oo1-xc34.google.com (mail-oo1-xc34.google.com [IPv6:2607:f8b0:4864:20::c34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE77CCEB for ; Fri, 11 Feb 2022 10:57:13 -0800 (PST) Received: by mail-oo1-xc34.google.com with SMTP id r15-20020a4ae5cf000000b002edba1d3349so11459361oov.3 for ; Fri, 11 Feb 2022 10:57:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=swiecki.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=QMVVkjMchB0s/a3beZw7NTzCf3sxBDL51mOIwpD203k=; b=GL0LgTUPusm/gXkWe5cb3RI71yed94r1V7/qjDQ2WB6QNQIkXk8wGM/c2r+tDbObeS yoYbBNf4fLZcJ7ByIgwTdWh+ACR0LlvA5ZPobiyqBjhSWZUUA5MIUr+RDFjfz17N3Scn l2GOKYbrL6ySj2J6Hk9571DTGIx3PDMLrB8Fg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=QMVVkjMchB0s/a3beZw7NTzCf3sxBDL51mOIwpD203k=; b=ZJ7aGwowTPGw4g+bJYGI+ZBz2t8dF28kxqHy009vViw67xS4S9agI/64rg6+q0UhAm pNa2PW2YjRgOcxDuKKop1jWzRdbMa2HJv9au+3vROT5TBlPAiOEm2d7BDMcMwXZFSng8 TgQELmGblnLA04O8mUxGp7i17mlD/lpC+sCQrskDVryGLYrqW6zkys3SLyHUoX6Q8zLB ftCJnAzlxIuAOfPawScivfwugY6C+/hIUQ7objCAzrfNE+rWprSoCMO35bqtv9sqUFyz RwAsd4hcaUkkarsUN0PXKseoq6qvMbnMRP55JWYbg9SzKZSPek+xiOXRgS4V4UVU+Snh 9WsA== X-Gm-Message-State: AOAM5304gM6+f7A8n70LyKDVVg4nBA488cgKg0coJOIj0C5D4exgfU8m Zr9To0nv26pLwv/0CuIzP1PddWspHySrGzbNDsIx4g== X-Received: by 2002:a05:6870:3906:: with SMTP id b6mr581232oap.83.1644605833197; Fri, 11 Feb 2022 10:57:13 -0800 (PST) MIME-Version: 1.0 References: <20220210025321.787113-1-keescook@chromium.org> <871r0a8u29.fsf@email.froward.int.ebiederm.org> <202202101033.9C04563D9@keescook> <87pmnu5z28.fsf@email.froward.int.ebiederm.org> <202202101137.B48D02138@keescook> <87k0e249tt.fsf@email.froward.int.ebiederm.org> <202202101710.668EDCDC@keescook> <875ypm41kb.fsf@email.froward.int.ebiederm.org> <202202101827.4B16DF54@keescook> <87a6ex1ek2.fsf@email.froward.int.ebiederm.org> In-Reply-To: <87a6ex1ek2.fsf@email.froward.int.ebiederm.org> From: =?UTF-8?B?Um9iZXJ0IMWad2nEmWNraQ==?= Date: Fri, 11 Feb 2022 19:57:02 +0100 Message-ID: Subject: Re: [PATCH 0/3] signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE To: "Eric W. Biederman" Cc: Kees Cook , Andy Lutomirski , Will Drewry , linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org pt., 11 lut 2022 o 18:47 Eric W. Biederman napisa= =C5=82(a): > > I think it'd be good to have some way of doing it from the perspective > > of a parent process - it'd simplify development of sandboxing managers > > (eg nsjail, minijail, firejail), and creation of good seccomp > > policies. > > By development do you mean debugging sandbox managers? Or do you mean > something that sandbox managers can use on a routine basis? On a routine basis for 2 purposes a). development of seccomp policies - the manager (regular parent of sandboxed process) can tell which syscall (and arguments) failed and it can be then added to policy (though, 'strace -f -c' might be a better option here) b). in case of actual seccomp SIGSYS kill, it could then inform users about what exactly and where happened (syscall no, cpu arch, arguments, maybe also eip + stack ptr) But, I don't want to derail the current bug fixing effort, so I just wanted to mention all of this quickly, and maybe we can follow up on this in the future.