From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932677AbcGLB7F (ORCPT ); Mon, 11 Jul 2016 21:59:05 -0400 Received: from mail-wm0-f42.google.com ([74.125.82.42]:35607 "EHLO mail-wm0-f42.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932129AbcGLB7D convert rfc822-to-8bit (ORCPT ); Mon, 11 Jul 2016 21:59:03 -0400 MIME-Version: 1.0 In-Reply-To: <1468274222-31726-1-git-send-email-mic@digikod.net> References: <1468274222-31726-1-git-send-email-mic@digikod.net> From: Kees Cook Date: Mon, 11 Jul 2016 21:59:00 -0400 X-Google-Sender-Auth: RPA4nPhsTi5HkLYPiM61FDUTLQM Message-ID: Subject: Re: [PATCH v1 0/3] Fix seccomp for UM (next) To: =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , James Morris Cc: LKML , Jeff Dike , Richard Weinberger , Olof Johansson , user-mode-linux-devel@lists.sourceforge.net, linux-security-module Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote: > Hi, > > This series fix the recent seccomp update for the User-mode Linux architecture > (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6 > (close the hole where ptrace can change a syscall out from under seccomp). > > Regards, > > Mickaël Salaün (3): > um/ptrace: Fix the syscall_trace_leave call > um/ptrace: Fix the syscall number update after a ptrace > seccomp: Remove 2-phase API documentation > > arch/Kconfig | 11 ----------- > arch/um/kernel/skas/syscall.c | 10 +++------- > arch/x86/um/ptrace_32.c | 3 +++ > arch/x86/um/ptrace_64.c | 4 ++++ > 4 files changed, 10 insertions(+), 18 deletions(-) Ah, perfect! Thanks for fixing this! James, can you pick this up for -next? Acked-by: Kees Cook -Kees -- Kees Cook Chrome OS & Brillo Security