On 04/21, Kees Cook wrote:
>
> On Sun, Apr 19, 2026 at 05:53:25PM +0200, Oleg Nesterov wrote:
> > seccomp_nack_syscall() calls syscall_rollback(), which means that the
> > syscall exit path sees the original syscall number as the return value.
> >
> > This confuses audit_syscall_exit(), trace_syscall_exit(), and ptrace,
> > causing them to report completely bogus syscall exit events.
> >
> > Add a new SYSCALL_WORK_SECCOMP_EXIT flag set by seccomp_nack_syscall(),
> > and change syscall_exit_work() to return early if this flag is set. After
> > all, this syscall was never actually executed.
>
> I think this looks good.

Great,

> I'd like to cover the non-generic syscall
> paths, though, too?

OK, I'll try to make the "extended" V2 soon.

> (Otherwise we immediately have a behavioral
> difference between e.g. x86 and arm64.)

Yes, yes, agreed, I even mentioned this in 0/2.

Thanks!

Oleg.


Reply via email to