Unprivileged BPF and authoritative security hooks
Unprivileged BPF and authoritative security hooks
Posted Apr 28, 2023 2:09 UTC (Fri) by geofft (subscriber, #59789)In reply to: Unprivileged BPF and authoritative security hooks by developer122
Parent article: Unprivileged BPF and authoritative security hooks
Android uses user IDs to great effect to sandbox applications from each other, even though Android is almost always used as a single-user OS. (On the other hand, iOS runs everything as a single user and has a separate kernel sandboxing thing, kind of like a mix between seccomp and LSMs. Both approaches have had bugs but have basically been sound designs overall, so maybe this is an argument that single-user machines don't really need UIDs.)
I'm not sure if this is what was meant, but I can see the argument that Linux is a single-person OS and powerful features like BPF should be controlled and assigned to UIDs by a single person.
