Re: [PATCH v11 07/12] seccomp: add SECCOMP_RET_ERRNO
From: Kees Cook
Date: Mon Feb 27 2012 - 13:09:40 EST
On Mon, Feb 27, 2012 at 9:11 AM, Oleg Nesterov <oleg@xxxxxxxxxx> wrote:
> On 02/24, Will Drewry wrote:
>>
>> static u32 seccomp_run_filters(int syscall)
>> {
>> struct seccomp_filter *f;
>> - u32 ret = SECCOMP_RET_KILL;
>> static const struct bpf_load_fn fns = {
>> bpf_load,
>> sizeof(struct seccomp_data),
>> };
>> + u32 ret = SECCOMP_RET_ALLOW;
>> const void *sc_ptr = (const void *)(uintptr_t)syscall;
>>
>> + /* Ensure unexpected behavior doesn't result in failing open. */
>> + if (unlikely(current->seccomp.filter == NULL))
>> + ret = SECCOMP_RET_KILL;
>
> Is "seccomp.filter == NULL" really possible?
It should not be, but I'm much more comfortable with this failing
closed. I think it's important to be as defensive as possible with
this code given its intended use.
-Kees
--
Kees Cook
ChromeOS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/