Efficient Syscall Emulation on Linux
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore efficient syscall emulation techniques on Linux in this 31-minute conference talk by Gabriel Krisman Bertazi from Collabora. Delve into the intricacies of system calls, their operating system and architecture-specific nature, and libc support. Compare Linux approaches with Windows implementations, understanding the concept behind "Wine is not an emulator." Examine syscall interception methods in userspace and kernel, including filtering techniques using SECCOMP specialized filters and Syscall User Dispatch. Gain insights into crossing Windows/Linux boundaries and enhancing system performance through optimized syscall emulation strategies.
Syllabus
Introducción
System calls
Operating-System specific
Architecture specific
A word on libc support
Same thing on Windows
"Wine is not an emulator". Why?
Syscall interception in userspace
We need to go into the kernel
Filtering syscalls in userspace
SECCOMP specialized filter
Syscall User Dispatch
Crossing Windows/Linux Boundaries
Taught by
Linux Foundation
Tags
Related Courses
Scenario Based LXD/LXC SecurityA Cloud Guru Scenario Based Docker Security
A Cloud Guru Using Seccomp to Limit the Kernel Attack Surface
Linux Foundation via YouTube Trace Me if You Can - Bypassing Linux Syscall Tracing
Black Hat via YouTube Sandboxing Based on SECCOMP for Linux Kernel
Ekoparty Security Conference via YouTube