kernel: fake system calls on seccomp to succeed
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com> Signed-off-by: celtare21 <celtare21@gmail.com>
This commit is contained in:
parent
f0625025f0
commit
1bc273fcb0
@ -2487,10 +2487,18 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3,
|
||||
error = SET_ENDIAN(me, arg2);
|
||||
break;
|
||||
case PR_GET_SECCOMP:
|
||||
#ifdef CONFIG_SECCOMP
|
||||
error = prctl_get_seccomp();
|
||||
#else
|
||||
error = 0;
|
||||
#endif
|
||||
break;
|
||||
case PR_SET_SECCOMP:
|
||||
#ifdef CONFIG_SECCOMP
|
||||
error = prctl_set_seccomp(arg2, (char __user *)arg3);
|
||||
#else
|
||||
error = 0;
|
||||
#endif
|
||||
break;
|
||||
case PR_GET_TSC:
|
||||
error = GET_TSC_CTL(arg2);
|
||||
|
Loading…
Reference in New Issue
Block a user