Skip to content

Security patch for linux kernel allowing to define sys calls and capabilities at process filename level

Notifications You must be signed in to change notification settings

mejmo/soskernel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

soskernel

Security patch for linux kernel allowing to define sys calls and capabilities at process filename level. It was quite interesting project related to linux security, applicable to kernel 2.6.28-7. Stays here just for showing off and next generations which would be interested in kernel patching and security at system calls level.

Usage

Kernel patch consists of two features. Limiting the system calls and capabilities. For system calls the patched kernel search for /proc/sos/syscalls/<syscall_name> where syscall_name must be one of the supported call names avaiable within system. One can set also the return value that should be returned when access to call is denied. For capabilities kernel reads /proc/sos/capabilities where every capability represents one bit of 14-bit string.

How it is patched

Just seven system calls are patched to show the simplicity. The routing sos_is_syscall_allowed makes all the magic inside sos.c.

if (!(sos_is_syscall_allowed(__NR_dup2, current, &fake_return_value, 1)))
  return fake_return_value;

For capability it's very similar:

if (sos_is_capable(current, has_capability(current, cap), cap))

About

Security patch for linux kernel allowing to define sys calls and capabilities at process filename level

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published