* Adrian Drzewiecki (z@private) wrote: > Last I checked, Andrea's patch has a fixed array of permitted syscalls. I > would like more flexibility than that. Perhaps I should've based my work > on his, and created a security_seccomp() call instead? Or maybe > security_syscall_enter() and security_syscall_exit() ? It's fixed, but can be set per process, and could be extended by either adding new modes, and changing the way you define which syscalls are allowed. I'd rather not introduce syscall filtering into LSM unless there's large demand for it. There's too many potential problems with syscall interposition. How flexible do you want, and what are your goals? thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
This archive was generated by hypermail 2.1.3 : Wed Dec 08 2004 - 12:09:19 PST