-
Notifications
You must be signed in to change notification settings - Fork 378
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
patch for seccomp #130
patch for seccomp #130
Conversation
We used proot and gdb to debug binaries within another sysroot. While it worked with the master branch and with an older kernel it doesn't work with a more recent kernel and/or this patch. You can reproduce it with this command:
With an older kernel and the master branch it works fine and when the application throws a segmentation fault we can catch it in gdb. With a more recent kernel and the master branch we have to use PROOT_NO_SECCOMP=1 but gdb freezes when the application terminates. With a more recent kernel and this PR we get a segmentation fault as documented above. |
This comment has been minimized.
This comment has been minimized.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See suggestions here: #130 (comment)
From: #149 |
What if the machine proot run on is not the same as the one on which it as been compiled ? |
If the kernel version doesn't match i.e. running on an older kernel, it will default to the old behavior. Also, it is important to note that the user can fake the kernel version at runtime via the |
Great ! |
Reopening due to #106 TODO
See: termux/proot#22, https://gitlab.com/proot/termux-proot References: |
Debugging
GentooAlpine |
As of the current master 5f780cb, I have to use |
Patch for seccomp on kernels >= 4.8.0
adds handle_tracee_event_kernel_4_8() to event.c