* Jeff Dike <[email protected]> wrote:
> Now, there were a couple of ways to legitimately escape from UML, and
> they *did* involve ptrace. Things like single-stepping a system call
> instruction or putting a breakpoint on a system call instruction and
> single-stepping from the breakpoint. As far as I know, these were
> discovered and fixed by UML developers before there was any outside
> awareness of these bugs.
also, UML 'ptrace clients' are allowed alot more leeway than what a
seccomp-alike ptrace/utrace based syscall filter would allow. It would
clearly exclude activities like 'setting a breakpoint' or
'single-stepping' - valid syscalls would be limited to
read/write/sigreturn/exit.
Ingo
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]