-
Notifications
You must be signed in to change notification settings - Fork 5
DSOs loaded into different address after execve #54
Comments
ptrace has an option called
The description is rather vague (to me) whether or not it can be used to keep seccomp disabled unless tracee calls |
@rrnewton There's another way to address this issue: modifying kernel seccomp source code, by introducing a special flag just like The problem is it is quite painful because we need to patch Linux kernel, and most likely impossible with azure pipeline; Also it would be hard to get the kernel patch accepted by mainstream linux kernel. |
kernel patch can be found in commit a0cf8b1 |
Very cool ;-). Let's see what they think. |
We setup seccomp filter rules based on DSO load address, unfortunately after
execve
syscall, the new DSOs can have different addresses, even when ASLR is disabled. seccomp filter rules are preserved afterexecve
, however, they become worthless because of the addresses change. Need to find a way to workaround this, but it won't be easy, due to seccomp's designThe text was updated successfully, but these errors were encountered: