[PATCH] ARM: ptrace: reload syscall number after secure_computing() check

Kees Cook keescook at chromium.org
Tue Jun 24 07:18:04 PDT 2014


On Tue, Jun 24, 2014 at 1:54 AM, Will Deacon <will.deacon at arm.com> wrote:
> On the syscall tracing path, we call out to secure_computing() to allow
> seccomp to check the syscall number being attempted. As part of this, a
> SIGTRAP may be sent to the tracer and the syscall could be re-written by
> a subsequent SET_SYSCALL ptrace request. Unfortunately, this new syscall
> is ignored by the current code unless TIF_SYSCALL_TRACE is also set on
> the current thread.
>
> This patch slightly reworks the enter path of the syscall tracing code
> so that we always reload the syscall number from
> current_thread_info()->syscall after the potential ptrace traps.
>
> Tested-by: Kees Cook <keescook at chromium.org>
> Signed-off-by: Will Deacon <will.deacon at arm.com>

Acked-by: Kees Cook <keescook at chromium.org>

Thanks!

-Kees

> ---
>  arch/arm/kernel/ptrace.c | 7 ++++---
>  1 file changed, 4 insertions(+), 3 deletions(-)
>
> diff --git a/arch/arm/kernel/ptrace.c b/arch/arm/kernel/ptrace.c
> index 0dd3b79b15c3..0c27ed6f3f23 100644
> --- a/arch/arm/kernel/ptrace.c
> +++ b/arch/arm/kernel/ptrace.c
> @@ -908,7 +908,7 @@ enum ptrace_syscall_dir {
>         PTRACE_SYSCALL_EXIT,
>  };
>
> -static int tracehook_report_syscall(struct pt_regs *regs,
> +static void tracehook_report_syscall(struct pt_regs *regs,
>                                     enum ptrace_syscall_dir dir)
>  {
>         unsigned long ip;
> @@ -926,7 +926,6 @@ static int tracehook_report_syscall(struct pt_regs *regs,
>                 current_thread_info()->syscall = -1;
>
>         regs->ARM_ip = ip;
> -       return current_thread_info()->syscall;
>  }
>
>  asmlinkage int syscall_trace_enter(struct pt_regs *regs, int scno)
> @@ -938,7 +937,9 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs, int scno)
>                 return -1;
>
>         if (test_thread_flag(TIF_SYSCALL_TRACE))
> -               scno = tracehook_report_syscall(regs, PTRACE_SYSCALL_ENTER);
> +               tracehook_report_syscall(regs, PTRACE_SYSCALL_ENTER);
> +
> +       scno = current_thread_info()->syscall;
>
>         if (test_thread_flag(TIF_SYSCALL_TRACEPOINT))
>                 trace_sys_enter(regs, scno);
> --
> 2.0.0
>



-- 
Kees Cook
Chrome OS Security



More information about the linux-arm-kernel mailing list