forked from Minki/linux
ce29856a5e
Update the syscall number after each PTRACE_SETREGS on ORIG_*AX.
This is needed to get the potentially altered syscall number in the
seccomp filters after RET_TRACE.
This fix four seccomp_bpf tests:
> [ RUN ] TRACE_syscall.skip_after_RET_TRACE
> seccomp_bpf.c:1560:TRACE_syscall.skip_after_RET_TRACE:Expected -1 (18446744073709551615) == syscall(39) (26)
> seccomp_bpf.c:1561:TRACE_syscall.skip_after_RET_TRACE:Expected 1 (1) == (*__errno_location ()) (22)
> [ FAIL ] TRACE_syscall.skip_after_RET_TRACE
> [ RUN ] TRACE_syscall.kill_after_RET_TRACE
> TRACE_syscall.kill_after_RET_TRACE: Test exited normally instead of by signal (code: 1)
> [ FAIL ] TRACE_syscall.kill_after_RET_TRACE
> [ RUN ] TRACE_syscall.skip_after_ptrace
> seccomp_bpf.c:1622:TRACE_syscall.skip_after_ptrace:Expected -1 (18446744073709551615) == syscall(39) (26)
> seccomp_bpf.c:1623:TRACE_syscall.skip_after_ptrace:Expected 1 (1) == (*__errno_location ()) (22)
> [ FAIL ] TRACE_syscall.skip_after_ptrace
> [ RUN ] TRACE_syscall.kill_after_ptrace
> TRACE_syscall.kill_after_ptrace: Test exited normally instead of by signal (code: 1)
> [ FAIL ] TRACE_syscall.kill_after_ptrace
Fixes:
|
||
---|---|---|
.. | ||
asm | ||
os-Linux | ||
shared/sysdep | ||
vdso | ||
bug.c | ||
bugs_32.c | ||
bugs_64.c | ||
checksum_32.S | ||
delay.c | ||
elfcore.c | ||
fault.c | ||
Kconfig | ||
ksyms.c | ||
ldt.c | ||
Makefile | ||
mem_32.c | ||
mem_64.c | ||
ptrace_32.c | ||
ptrace_64.c | ||
ptrace_user.c | ||
setjmp_32.S | ||
setjmp_64.S | ||
signal.c | ||
stub_32.S | ||
stub_64.S | ||
stub_segv.c | ||
sys_call_table_32.c | ||
sys_call_table_64.c | ||
syscalls_64.c | ||
sysrq_32.c | ||
sysrq_64.c | ||
tls_32.c | ||
tls_64.c | ||
user-offsets.c |