From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753621AbaFWIq6 (ORCPT ); Mon, 23 Jun 2014 04:46:58 -0400 Received: from cam-admin0.cambridge.arm.com ([217.140.96.50]:37733 "EHLO cam-admin0.cambridge.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753176AbaFWIq4 (ORCPT ); Mon, 23 Jun 2014 04:46:56 -0400 Date: Mon, 23 Jun 2014 09:46:09 +0100 From: Will Deacon To: Kees Cook Cc: "linux-kernel@vger.kernel.org" , Russell King , Andy Lutomirski , Andrew Morton , Jonathan Austin , =?iso-8859-1?Q?Andr=E9?= Hentschel , Oleg Nesterov , "linux-arm-kernel@lists.infradead.org" , Ricky Zhou Subject: Re: [PATCH] arm: ptrace: fix syscall modification under PTRACE_O_TRACESECCOMP Message-ID: <20140623084608.GA9316@arm.com> References: <20140618202748.GA9022@www.outflux.net> <20140620102258.GA26626@arm.com> <20140620172330.GA30656@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 20, 2014 at 07:10:46PM +0100, Kees Cook wrote: > On Fri, Jun 20, 2014 at 10:36 AM, Kees Cook wrote: > > On Fri, Jun 20, 2014 at 10:23 AM, Will Deacon wrote: > >> Right, gotcha. Thanks for the explanation. I was confused, because > >> tracehook_report_syscall does the right thing (returns > >> current_thread_info()->syscall), but if we don't have TIF_SYSCALL_TRACE set, > >> then updates during the secure_computing callback will be ignored. > >> > >> However, my fix to this is significantly smaller than your patch, so I fear > >> I'm still missing something. > > > > Oh, yes, that's much smaller. Nice! I will test this and report back. > > Yup, I can confirm this works. Thanks! > > Tested-by: Kees Cook Thanks, Kees. I'll post a patch shortly. I'll try and remember to keep an eye out for this when seccomp lands for arm64 too. Will