diff options
author | Kees Cook <keescook@chromium.org> | 2016-06-02 22:56:43 -0400 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2016-06-14 13:54:46 -0400 |
commit | 635efc702984857b45a2a2491ed7a529e14cbdf9 (patch) | |
tree | a85e780e94d69da8bbd2c9a914d14a61353092af | |
parent | 1addc57e111b920f94edb867094ccaa7c1e820b8 (diff) |
tile/ptrace: run seccomp after ptrace
Close the hole where ptrace can change a syscall out from under seccomp.
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Chris Metcalf <cmetcalf@mellanox.com>
-rw-r--r-- | arch/tile/kernel/ptrace.c | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/arch/tile/kernel/ptrace.c b/arch/tile/kernel/ptrace.c index 8c6d2f2fefa3..d89b7011667c 100644 --- a/arch/tile/kernel/ptrace.c +++ b/arch/tile/kernel/ptrace.c | |||
@@ -255,14 +255,15 @@ int do_syscall_trace_enter(struct pt_regs *regs) | |||
255 | { | 255 | { |
256 | u32 work = ACCESS_ONCE(current_thread_info()->flags); | 256 | u32 work = ACCESS_ONCE(current_thread_info()->flags); |
257 | 257 | ||
258 | if (secure_computing(NULL) == -1) | 258 | if ((work & _TIF_SYSCALL_TRACE) && |
259 | tracehook_report_syscall_entry(regs)) { | ||
260 | regs->regs[TREG_SYSCALL_NR] = -1; | ||
259 | return -1; | 261 | return -1; |
260 | |||
261 | if (work & _TIF_SYSCALL_TRACE) { | ||
262 | if (tracehook_report_syscall_entry(regs)) | ||
263 | regs->regs[TREG_SYSCALL_NR] = -1; | ||
264 | } | 262 | } |
265 | 263 | ||
264 | if (secure_computing(NULL) == -1) | ||
265 | return -1; | ||
266 | |||
266 | if (work & _TIF_SYSCALL_TRACEPOINT) | 267 | if (work & _TIF_SYSCALL_TRACEPOINT) |
267 | trace_sys_enter(regs, regs->regs[TREG_SYSCALL_NR]); | 268 | trace_sys_enter(regs, regs->regs[TREG_SYSCALL_NR]); |
268 | 269 | ||