Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2021-05-31 15:49:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] eBPF seccomp() filters
The seccomp()
mechanism allows a process to load a BPF program to restrict its future use
of system calls; it is a simple but flexible sandboxing mechanism that is
widely used. Those filter programs, though, run on the "classic" BPF virtual
machine, rather than the extended BPF
(eBPF)
machine used elsewhere in the
kernel. Moving seccomp() to eBPF has been an often-requested
change, but security concerns have prevented that from happening. The
latest attempt to enable eBPF is this patch
set
from YiFei Zhu; whether it will succeed where others have failed
remains to be seen.


(Читать комментарии) (Добавить комментарий)