Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

seccomp vs reading file input at startup #53

Open
GoogleCodeExporter opened this issue Apr 23, 2015 · 1 comment
Open

seccomp vs reading file input at startup #53

GoogleCodeExporter opened this issue Apr 23, 2015 · 1 comment

Comments

@GoogleCodeExporter
Copy link

$ ol --seccomp -e '(print "hello")'
hello
delivered
$ echo '(print "hello")' | ol -q --seccomp
hello
$ echo '(print "hello")' > /tmp/foo; ol --seccomp /tmp/foo
Killed

Technically this is correct, since the repl goes seccomp immediately after 
parsing arguments if requested, but it would probably be better to read the 
files to memory (sans parsing and eval) and only then go seccomp, so that only 
disallowed things happening during later stages could cause a kill. This would 
also make it possible to use #!/usr/bin/ol -Sr to make seccomp'd scripts that 
take arguments.

Original issue reported on code.google.com by aohelin on 14 Dec 2011 at 10:31

@GoogleCodeExporter
Copy link
Author

Original comment by aohelin on 18 May 2012 at 7:59

  • Added labels: Type-Enhancement
  • Removed labels: Type-Defect

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant