[PATCH] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)

Will Deacon will at kernel.org
Thu Feb 25 06:02:18 EST 2021


On Mon, 18 Jan 2021 02:58:58 +0000, Timothy Baldwin wrote:
>  From c047f549699d31ed91d5ac0cadbcf76a02cd801e Mon Sep 17 00:00:00 2001
> From: Timothy E Baldwin<T.E.Baldwin99 at members.leeds.ac.uk>
> Date: Sat, 16 Jan 2021 15:18:54 +0000
> Subject: [PATCH] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)
> 
> Since commit f086f67485c5 ("arm64: ptrace: add support for syscall
> emulation"), if system call number -1 is called and the process is being
> traced with PTRACE_SYSCALL, for example by strace, the seccomp check is
> skipped and -ENOSYS is returned unconditionally (unless altered by the
> tracer) rather than carrying out action specified in the seccomp filter.
> 
> [...]

(Note that I had to fix up whitespace errors in order for git am to apply
 this, so please check the resulting commit).

Applied to arm64 (for-next/fixes), thanks!

[1/1] arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)
      https://git.kernel.org/arm64/c/df84fe947089

Cheers,
-- 
Will

https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev



More information about the linux-arm-kernel mailing list