You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are hundreds of x86_64 syscalls, categorized in #231. We want to start by winnowing these down to a starting subset that we can allowlist and implement specialized policies for as needed. Once we're secure on programs that use only the allowlisted subset, we can expand to support more programs as needed.
I've surveyed a few programs, and the below are dedup'd+sorted lists of syscalls executed.
We should also characterize nginx, but I think these give a good idea of where to start with an initial syscall allowlist. Of these syscalls, mmap/munmap/mprotect, pkey_alloc/pkey_mprotect, rt_sigaction/rt_sigprocmask, clone3, and openat are the syscalls that require the most infrastructure to properly implement policy for.
There are hundreds of x86_64 syscalls, categorized in #231. We want to start by winnowing these down to a starting subset that we can allowlist and implement specialized policies for as needed. Once we're secure on programs that use only the allowlisted subset, we can expand to support more programs as needed.
I've surveyed a few programs, and the below are dedup'd+sorted lists of syscalls executed.
Collected with:
ls
sh -c exit
w
echo 4+4 | python3 -i
Across our tests, we have the following syscall counts:
We should also characterize nginx, but I think these give a good idea of where to start with an initial syscall allowlist. Of these syscalls,
mmap
/munmap
/mprotect
,pkey_alloc
/pkey_mprotect
,rt_sigaction
/rt_sigprocmask
,clone3
, andopenat
are the syscalls that require the most infrastructure to properly implement policy for.TODOs:
set_tid_address
is constrained by pkeys #292clone
orarch_prctl(ARCH_SET_FS)
) undermines compartmentalization #291The text was updated successfully, but these errors were encountered: