[PATCH] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)
Will Deacon
will at kernel.org
Thu Feb 25 06:02:18 EST 2021
On Mon, 18 Jan 2021 02:58:58 +0000, Timothy Baldwin wrote:
> From c047f549699d31ed91d5ac0cadbcf76a02cd801e Mon Sep 17 00:00:00 2001
> From: Timothy E Baldwin<T.E.Baldwin99 at members.leeds.ac.uk>
> Date: Sat, 16 Jan 2021 15:18:54 +0000
> Subject: [PATCH] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)
>
> Since commit f086f67485c5 ("arm64: ptrace: add support for syscall
> emulation"), if system call number -1 is called and the process is being
> traced with PTRACE_SYSCALL, for example by strace, the seccomp check is
> skipped and -ENOSYS is returned unconditionally (unless altered by the
> tracer) rather than carrying out action specified in the seccomp filter.
>
> [...]
(Note that I had to fix up whitespace errors in order for git am to apply
this, so please check the resulting commit).
Applied to arm64 (for-next/fixes), thanks!
[1/1] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)
https://git.kernel.org/arm64/c/df84fe947089
Cheers,
--
Will
https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev
More information about the linux-arm-kernel
mailing list