11 Jul, 2020
1 commit
-
The terminator for the mode 1 syscalls list was a 0, but that could be
a valid syscall number (e.g. x86_64 __NR_read). By luck, __NR_read was
listed first and the loop construct would not test it, so there was no
bug. However, this is fragile. Replace the terminator with -1 instead,
and make the variable name for mode 1 syscall lists more descriptive.Cc: Andy Lutomirski
Cc: Will Drewry
Signed-off-by: Kees Cook
19 Jun, 2019
1 commit
-
Based on 2 normalized pattern(s):
this program is free software you can redistribute it and or modify
it under the terms of the gnu general public license version 2 as
published by the free software foundationthis program is free software you can redistribute it and or modify
it under the terms of the gnu general public license version 2 as
published by the free software foundation #extracted by the scancode license scanner the SPDX license identifier
GPL-2.0-only
has been chosen to replace the boilerplate/reference in 4122 file(s).
Signed-off-by: Thomas Gleixner
Reviewed-by: Enrico Weigelt
Reviewed-by: Kate Stewart
Reviewed-by: Allison Randal
Cc: linux-spdx@vger.kernel.org
Link: https://lkml.kernel.org/r/20190604081206.933168790@linutronix.de
Signed-off-by: Greg Kroah-Hartman
13 May, 2016
1 commit
-
Move retrieval of compat syscall numbers into inline function defined in
asm-generic header so that arches may override it.[ralf@linux-mips.org: Resolve merge conflict.]
Suggested-by: Paul Burton
Signed-off-by: Matt Redfearn
Acked-by: Kees Cook
Cc: IMG-MIPSLinuxKerneldevelopers@imgtec.com
Cc: Arnd Bergmann
Cc: Andy Lutomirski
Cc: Will Drewry
Cc: linux-arch@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Patchwork: https://patchwork.linux-mips.org/patch/12978/
Signed-off-by: Ralf Baechle
17 Apr, 2015
1 commit
-
Most architectures don't need to do much special for the strict-mode
seccomp syscall entries. Remove the redundant headers and reduce the
others.This patch (of 8):
Some architectures may need to override the compat sigreturn definition,
as is already possible in the non-compat case.Signed-off-by: Kees Cook
Cc: Ingo Molnar
Cc: "H. Peter Anvin"
Cc: Thomas Gleixner
Cc: Russell King
Cc: Michal Simek
Cc: Ralf Baechle
Cc: "James E.J. Bottomley"
Cc: Helge Deller
Cc: Benjamin Herrenschmidt
Cc: Paul Mackerras
Cc: Michael Ellerman
Cc: "David S. Miller"
Cc: Arnd Bergmann
Cc: Frederic Weisbecker
Cc: Peter Zijlstra
Cc: Will Deacon
Cc: Daniel Borkmann
Cc: Laura Abbott
Cc: James Hogan
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
28 Nov, 2014
1 commit
-
Those values (__NR_seccomp_*) are used solely in secure_computing()
to identify mode 1 system calls. If compat system calls have different
syscall numbers, asm/seccomp.h may override them.Acked-by: Arnd Bergmann
Reviewed-by: Kees Cook
Signed-off-by: AKASHI Takahiro
Signed-off-by: Will Deacon