diff options
author | Sargun Dhillon <[email protected]> | 2019-12-28 22:24:50 -0800 |
---|---|---|
committer | Kees Cook <[email protected]> | 2020-01-02 13:03:45 -0800 |
commit | 2882d53c9c6f3b8311d225062522f03772cf0179 (patch) | |
tree | 28a5e06d8dac7c2df05519ddd05c91a601767a5e /scripts/gcc-plugins/cyc_complexity_plugin.c | |
parent | 88c13f8bd71472fbab5338b01d99122908c77e53 (diff) |
seccomp: Check that seccomp_notif is zeroed out by the user
This patch is a small change in enforcement of the uapi for
SECCOMP_IOCTL_NOTIF_RECV ioctl. Specifically, the datastructure which
is passed (seccomp_notif) must be zeroed out. Previously any of its
members could be set to nonsense values, and we would ignore it.
This ensures all fields are set to their zero value.
Signed-off-by: Sargun Dhillon <[email protected]>
Reviewed-by: Christian Brauner <[email protected]>
Reviewed-by: Aleksa Sarai <[email protected]>
Acked-by: Tycho Andersen <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Fixes: 6a21cc50f0c7 ("seccomp: add a return code to trap to userspace")
Cc: [email protected]
Signed-off-by: Kees Cook <[email protected]>
Diffstat (limited to 'scripts/gcc-plugins/cyc_complexity_plugin.c')
0 files changed, 0 insertions, 0 deletions