Главная
Study mode:
on
1
Intro
2
What is Seccomp
3
System calls
4
Seccomp history
5
Filter mode
6
System call limitation
7
Seccomp
8
Second Filtering
9
BPF
10
Virtual Machine
11
Conditional Jump Instructions
12
Relative Offsets
13
System Call Structure
14
BPF Statement
15
BPF Jump
16
BPF Return
17
ADD
18
Architecture
19
System Call Numbers
20
System Call Conventions
21
Filter Program
22
Example
23
Performance Cost
24
Which System Causes My Application Make
25
What About That
26
System Call Filtering
27
Lubeset Comp
28
Seccomp Context
29
BPF Compiler
30
JIT Compiler
31
Applications
32
Further Information
33
Questions
Description:
Explore the intricacies of Seccomp (secure computing) in this comprehensive 52-minute conference talk by Michael Kerrisk at NDC Conferences. Dive deep into the Linux kernel's system call filtering mechanism, understanding how to limit and control program interactions with the kernel. Learn about the BPF virtual machine, its role in examining system call numbers and arguments, and how to write effective filter programs. Discover practical examples of restricting permitted system calls, productivity aids for BPF filter creation, and important considerations for implementation. Gain valuable insights into this widely-used tool employed by Docker, LXC, web browsers, systemd, Flatpak, and Firejail. From Seccomp's history and filter modes to BPF instructions and system call conventions, acquire a solid foundation in enhancing Linux system security through precise system call management.

Using Seccomp to Limit the Kernel Attack Surface

NDC Conferences
Add to list