On August 17, 2019 5:36:54 PM GMT+02:00, Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx> wrote: >On Sat, Aug 17, 2019 at 05:16:53PM +0200, Christian Brauner wrote: >> On August 17, 2019 5:08:45 PM GMT+02:00, Alexei Starovoitov ><alexei.starovoitov@xxxxxxxxx> wrote: >> >On Sat, Aug 17, 2019 at 12:22:53AM +0200, Christian Brauner wrote: >> >> >> >> (The one usecase I'd care about is to extend seccomp to do >> >pointer-based >> >> syscall filtering. Whether or not that'd require (unprivileged) >ebpf >> >is >> >> up for discussion at KSummit.) >> > >> >Kees have been always against using ebpf in seccomp. I believe he >still >> >holds this opinion. Until he changes his mind let's stop bringing >> >seccomp >> >as a use case for unpriv bpf. >> >> That's why I said "whether or not". >> For the record, I do prefer a non-unpriv-ebpf way. >> It's still something that will most surely come up in the discussion >though. > >It's very un-kernely way to defer to in-person meetings. >If there is anything to discuss please discuss it on the public mailing >list. https://lists.linuxfoundation.org/pipermail/ksummit-discuss/2019-July/006699.html