Re: [PATCH v5 2/3] seccomp_filters: system call filtering using BPF
From: Cong Wang
Date: Sat Jan 28 2012 - 06:22:52 EST
On Fri, 2012-01-27 at 17:24 -0600, Will Drewry wrote:
> +config SECCOMP_FILTER
> + bool "Enable seccomp-based system call filtering"
> + select SECCOMP
Is 'depends on SECCOMP' better?
> + help
> + This option provide support for limiting the accessibility
> of
s/provide/provides/
> + systems calls at a task-level using a dynamically defined
> policy.
s/systems/system/
> +
> + System call filtering policy is expressed by the user using
> + a Berkeley Packet Filter program. The program is attached
> using
s/the user using//
> + prctl(2). For every system call the task makes, its number,
> + arguments, and other metadata will be evaluated by the
> attached
> + filter program. The result determines if the system call
> may
> + may proceed or if the task should be terminated.
One more "may"... and "be proceeded"
> +
> + This behavior is meant to aid security-conscious software in
> + its ability to minimize the risk of running potentially
> + risky code.
> +
> + See Documentation/prctl/seccomp_filter.txt for more detail.
> +
Thanks.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/