• K
    seccomp: add tests for ptrace hole · 58d0a862
    Kees Cook 提交于
    One problem with seccomp was that ptrace could be used to change a
    syscall after seccomp filtering had completed. This was a well documented
    limitation, and it was recommended to block ptrace when defining a filter
    to avoid this problem. This can be quite a limitation for containers or
    other places where ptrace is desired even under seccomp filters.
    
    This adds tests for both SECCOMP_RET_TRACE and PTRACE_SYSCALL manipulations.
    Signed-off-by: NKees Cook <keescook@chromium.org>
    Cc: Andy Lutomirski <luto@kernel.org>
    58d0a862
seccomp_bpf.c 61.6 KB