forked from luck/tmp_suning_uos_patched
ce29856a5e
Update the syscall number after each PTRACE_SETREGS on ORIG_*AX.
This is needed to get the potentially altered syscall number in the
seccomp filters after RET_TRACE.
This fix four seccomp_bpf tests:
> [ RUN ] TRACE_syscall.skip_after_RET_TRACE
> seccomp_bpf.c:1560:TRACE_syscall.skip_after_RET_TRACE:Expected -1 (18446744073709551615) == syscall(39) (26)
> seccomp_bpf.c:1561:TRACE_syscall.skip_after_RET_TRACE:Expected 1 (1) == (*__errno_location ()) (22)
> [ FAIL ] TRACE_syscall.skip_after_RET_TRACE
> [ RUN ] TRACE_syscall.kill_after_RET_TRACE
> TRACE_syscall.kill_after_RET_TRACE: Test exited normally instead of by signal (code: 1)
> [ FAIL ] TRACE_syscall.kill_after_RET_TRACE
> [ RUN ] TRACE_syscall.skip_after_ptrace
> seccomp_bpf.c:1622:TRACE_syscall.skip_after_ptrace:Expected -1 (18446744073709551615) == syscall(39) (26)
> seccomp_bpf.c:1623:TRACE_syscall.skip_after_ptrace:Expected 1 (1) == (*__errno_location ()) (22)
> [ FAIL ] TRACE_syscall.skip_after_ptrace
> [ RUN ] TRACE_syscall.kill_after_ptrace
> TRACE_syscall.kill_after_ptrace: Test exited normally instead of by signal (code: 1)
> [ FAIL ] TRACE_syscall.kill_after_ptrace
Fixes:
|
||
---|---|---|
.. | ||
skas | ||
asm-offsets.c | ||
config.c.in | ||
dyn.lds.S | ||
early_printk.c | ||
exec.c | ||
exitcode.c | ||
gmon_syms.c | ||
gprof_syms.c | ||
initrd.c | ||
irq.c | ||
kmsg_dump.c | ||
ksyms.c | ||
maccess.c | ||
Makefile | ||
mem.c | ||
physmem.c | ||
process.c | ||
ptrace.c | ||
reboot.c | ||
sigio.c | ||
signal.c | ||
stacktrace.c | ||
syscall.c | ||
sysrq.c | ||
time.c | ||
tlb.c | ||
trap.c | ||
um_arch.c | ||
umid.c | ||
uml.lds.S | ||
vmlinux.lds.S |