Kees Cook <keescook@xxxxxxxxxxxx> writes: > On Fri, Sep 04, 2020 at 04:31:39PM -0400, Gabriel Krisman Bertazi wrote: >> Convert TIF_SECCOMP into a generic TI flag for any syscall interception >> work being done by the kernel. The actual type of work is exposed by a >> new flag field outside of thread_info. This ensures that the >> syscall_intercept field is only accessed if struct seccomp has to be >> accessed already, such that it doesn't incur in a much higher cost to >> the seccomp path. >> >> In order to avoid modifying every architecture at once, this patch has a >> transition mechanism, such that architectures that define TIF_SECCOMP >> continue to work by ignoring the syscall_intercept flag, as long as they >> don't support other syscall interception mechanisms like the future >> syscall user dispatch. When migrating TIF_SECCOMP to >> TIF_SYSCALL_INTERCEPT, they should adopt the semantics of checking the >> syscall_intercept flag, like it is done in the common entry syscall >> code, or even better, migrate to the common syscall entry code. > > Can we "eat" all the other flags like ptrace, audit, etc, too? Doing > this only for seccomp seems strange. Hi Kees, Thanks again for the review. Yes, we can, and I'm happy to follow up with that as part of my TIF clean up work, but can we not block the current patchset to be merged waiting for that, as this already grew a lot from the original feature submission? Also, Thomas do you mind this approach to reduce the usage of TIF_ flags? I remember you suggested simply expanding the variable to 64 bits at some point. Thanks, -- Gabriel Krisman Bertazi