Re: [PATCH v1 0/3] Fix seccomp for UM (next)

From: Kees Cook
Date: Mon Jul 11 2016 - 21:59:25 EST


On Mon, Jul 11, 2016 at 5:56 PM, MickaÃl SalaÃn <mic@xxxxxxxxxxx> wrote:
> Hi,
>
> This series fix the recent seccomp update for the User-mode Linux architecture
> (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
> (close the hole where ptrace can change a syscall out from under seccomp).
>
> Regards,
>
> MickaÃl SalaÃn (3):
> um/ptrace: Fix the syscall_trace_leave call
> um/ptrace: Fix the syscall number update after a ptrace
> seccomp: Remove 2-phase API documentation
>
> arch/Kconfig | 11 -----------
> arch/um/kernel/skas/syscall.c | 10 +++-------
> arch/x86/um/ptrace_32.c | 3 +++
> arch/x86/um/ptrace_64.c | 4 ++++
> 4 files changed, 10 insertions(+), 18 deletions(-)

Ah, perfect! Thanks for fixing this! James, can you pick this up for -next?

Acked-by: Kees Cook <keescook@xxxxxxxxxxxx>

-Kees

--
Kees Cook
Chrome OS & Brillo Security