diff options
author | Kees Cook <keescook@chromium.org> | 2016-05-26 21:47:01 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2016-06-14 20:54:38 +0300 |
commit | 58d0a862f573c3354fa912603ef5a4db188774e7 (patch) | |
tree | 7d7f4c5ad0c47c9353da6a4528aeaab1f4d2088d /include/linux/seccomp.h | |
parent | 40d273782ff16fe1a7445cc05c66a447dfea3433 (diff) | |
download | linux-58d0a862f573c3354fa912603ef5a4db188774e7.tar.xz |
seccomp: add tests for ptrace hole
One problem with seccomp was that ptrace could be used to change a
syscall after seccomp filtering had completed. This was a well documented
limitation, and it was recommended to block ptrace when defining a filter
to avoid this problem. This can be quite a limitation for containers or
other places where ptrace is desired even under seccomp filters.
This adds tests for both SECCOMP_RET_TRACE and PTRACE_SYSCALL manipulations.
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Andy Lutomirski <luto@kernel.org>
Diffstat (limited to 'include/linux/seccomp.h')
0 files changed, 0 insertions, 0 deletions