Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole

From: Andi Kleen
Date: Fri May 08 2009 - 15:19:01 EST


"Markus Gutschke (ÜÒÐ)" <markus@xxxxxxxxxx> writes:
>
> There are a large number of system calls that "normal" C/C++ code uses
> quite frequently, and that are not security sensitive. A typical
> example would be gettimeofday().

At least on x86-64 gettimeofday() (and time(2)) work inside seccomp because
they're vsyscalls that run in ring 3 only.

-Andi

--
ak@xxxxxxxxxxxxxxx -- Speaking for myself only.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/