|
|
Subscribe / Log in / New account

Re: RFC: seccomp-bpf support

From:  Andres Freund <andres-AT-anarazel.de>
To:  Joshua Brindle <joshua.brindle-AT-crunchydata.com>
Subject:  Re: RFC: seccomp-bpf support
Date:  Wed, 28 Aug 2019 11:53:02 -0700
Message-ID:  <20190828185302.rmc66g45ev7gv5ib@alap3.anarazel.de>
Cc:  Tom Lane <tgl-AT-sss.pgh.pa.us>, Joe Conway <mail-AT-joeconway.com>, PostgreSQL-development <pgsql-hackers-AT-postgresql.org>
Archive-link:  Article

Hi,

On 2019-08-28 14:47:04 -0400, Joshua Brindle wrote:
> A prime example is madvise() which was a catastrophic failure that 1)
> isn't preventable by any LSM including SELinux, 2) isn't used by PG
> and is therefore a good candidate for a kill list, and 3) a clear win
> in the dont-let-PG-be-a-vector-for-kernel-compromise arena.

IIRC it's used by glibc as part of its malloc implementation (also
threading etc) - but not necessarily hit during the most common
paths. That's *precisely* my problem with this approach.

Greetings,

Andres Freund





to post comments


Copyright © 2019, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds