aboutsummaryrefslogtreecommitdiffstats
path: root/man2
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2020-09-30 22:24:59 +0200
committerMichael Kerrisk <mtk.manpages@gmail.com>2021-06-10 10:40:17 +1200
commit391194cd52f33e423c5ea02a89ff3841f4b8ecf6 (patch)
treef3f55d16acb932c08388b582aec56f9bc28f9d28 /man2
parenta9a8e3564493110552c48f232f56644c5cd46acd (diff)
downloadman-pages-391194cd52f33e423c5ea02a89ff3841f4b8ecf6.tar.gz
seccomp_unotify.2: Changes after feed back from Tycho Andersen
Reported-by: Tycho Andersen <tycho@tycho.pizza> Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man2')
-rw-r--r--man2/seccomp_unotify.214
1 files changed, 6 insertions, 8 deletions
diff --git a/man2/seccomp_unotify.2 b/man2/seccomp_unotify.2
index 5b1e80a2e5..0bc53ac6db 100644
--- a/man2/seccomp_unotify.2
+++ b/man2/seccomp_unotify.2
@@ -99,9 +99,6 @@ over a UNIX domain socket connection between the two processes (using the
.BR SCM_RIGHTS
ancillary message type described in
.BR unix (7)).
-Another possibility is that the supervisor might inherit
-the file descriptor via
-.BR fork (2).
.\"-------------------------------------
.IP 3.
The supervisor process will receive notification events
@@ -168,12 +165,10 @@ The information in the notification can be used to discover the
values of pointer arguments for the target process's system call.
(This is something that can't be done from within a seccomp filter.)
To do this (and assuming it has suitable permissions),
-the supervisor opens the corresponding
+One way in which the supervisor can do this is to open the corresponding
.I /proc/[pid]/mem
-file, seeks to the memory location that corresponds
-to one of the pointer arguments whose value is supplied
-in the notification event,
-and reads bytes from that location.
+file and read bytes from the location that corresponds to one of
+the pointer arguments whose value is supplied in the notification event.
.\" Tycho Andersen mentioned that there are alternatives to /proc/PID/mem,
.\" such as ptrace() and /proc/PID/map_files
(The supervisor must be careful to avoid
@@ -1316,3 +1311,6 @@ main(int argc, char *argv[])
.SH SEE ALSO
.BR ioctl (2),
.BR seccomp (2)
+.PP
+A further example program can be found in the kernel source file
+.IR samples/seccomp/user-trap.c .