From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= Subject: [PATCH v2 0/3] Fix seccomp for UM (next) Date: Mon, 1 Aug 2016 23:01:54 +0200 Message-Id: <1470085317-11932-1-git-send-email-mic@digikod.net> In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org To: linux-kernel@vger.kernel.org Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Kees Cook , Jeff Dike , Richard Weinberger , James Morris , Olof Johansson , user-mode-linux-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org List-ID: Hi, This series fix the recent seccomp update for the User-mode Linux architecture (32-bit and 64-bit) since commit 26703c636c1f ("um/ptrace: run seccomp after ptrace") which close the hole where ptrace can change a syscall out from under seccomp. Changes since v1: * fix commit message typo [2/3] * add Kees Cook's Acked-by * rebased on commit 7616ac70d1bb ("apparmor: fix SECURITY_APPARMOR_HASH_DEFAULT parameter handling") Available in the git repository at: https://github.com/l0kod/linux heads/um-fix-seccomp-ptrace-v2 Regards, Mickaël Salaün (3): um/ptrace: Fix the syscall_trace_leave call um/ptrace: Fix the syscall number update after a ptrace seccomp: Remove 2-phase API documentation arch/Kconfig | 11 ----------- arch/um/kernel/skas/syscall.c | 10 +++------- arch/x86/um/ptrace_32.c | 3 +++ arch/x86/um/ptrace_64.c | 4 ++++ 4 files changed, 10 insertions(+), 18 deletions(-) -- 2.8.1