1. 26 7月, 2012 2 次提交
  2. 22 7月, 2012 1 次提交
  3. 15 7月, 2012 1 次提交
  4. 14 7月, 2012 1 次提交
    • W
      x86/vsyscall: allow seccomp filter in vsyscall=emulate · 5651721e
      Will Drewry 提交于
      If a seccomp filter program is installed, older static binaries and
      distributions with older libc implementations (glibc 2.13 and earlier)
      that rely on vsyscall use will be terminated regardless of the filter
      program policy when executing time, gettimeofday, or getcpu.  This is
      only the case when vsyscall emulation is in use (vsyscall=emulate is the
      default).
      
      This patch emulates system call entry inside a vsyscall=emulate by
      populating regs->ax and regs->orig_ax with the system call number prior
      to calling into seccomp such that all seccomp-dependencies function
      normally.  Additionally, system call return behavior is emulated in line
      with other vsyscall entrypoints for the trace/trap cases.
      
      [ v2: fixed ip and sp on SECCOMP_RET_TRAP/TRACE (thanks to luto@mit.edu) ]
      Reported-and-tested-by: NOwen Kibel <qmewlo@gmail.com>
      Signed-off-by: NWill Drewry <wad@chromium.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      5651721e
  5. 10 7月, 2012 2 次提交
  6. 06 7月, 2012 15 次提交
  7. 02 7月, 2012 2 次提交
  8. 30 6月, 2012 1 次提交
  9. 26 6月, 2012 3 次提交
  10. 25 6月, 2012 1 次提交
  11. 21 6月, 2012 1 次提交
  12. 20 6月, 2012 3 次提交
  13. 18 6月, 2012 7 次提交