On Fri, 21 Jan 2005, Chris Wright wrote:
* Ingo Molnar ([EMAIL PROTECTED]) wrote:

why do you need any kernel code for this? This seems to be a limited
ptrace implementation: restricting untrusted userspace code to only be
able to exec read/write/sigreturn.

Only difference is in number of context switches, and number of running processes (and perhaps ease of determining policy for which syscalls are allowed). Although it's not really seccomp, it's just restricted syscalls...

Yes, but do you care about the performance of syscalls which the program isn't allowed to call at all ? ;)

--
"Debugging is twice as hard as writing the code in the first place.
Therefore, if you write the code as cleverly as possible, you are,
by definition, not smart enough to debug it." - Brian W. Kernighan
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to