diff options
author | Sargun Dhillon <sargun@sargun.me> | 2019-12-28 22:24:50 -0800 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2020-01-02 13:03:45 -0800 |
commit | 2882d53c9c6f3b8311d225062522f03772cf0179 (patch) | |
tree | 28a5e06d8dac7c2df05519ddd05c91a601767a5e /sound | |
parent | 88c13f8bd71472fbab5338b01d99122908c77e53 (diff) | |
download | linux-2882d53c9c6f3b8311d225062522f03772cf0179.tar.gz linux-2882d53c9c6f3b8311d225062522f03772cf0179.tar.bz2 linux-2882d53c9c6f3b8311d225062522f03772cf0179.zip |
seccomp: Check that seccomp_notif is zeroed out by the user
This patch is a small change in enforcement of the uapi for
SECCOMP_IOCTL_NOTIF_RECV ioctl. Specifically, the datastructure which
is passed (seccomp_notif) must be zeroed out. Previously any of its
members could be set to nonsense values, and we would ignore it.
This ensures all fields are set to their zero value.
Signed-off-by: Sargun Dhillon <sargun@sargun.me>
Reviewed-by: Christian Brauner <christian.brauner@ubuntu.com>
Reviewed-by: Aleksa Sarai <cyphar@cyphar.com>
Acked-by: Tycho Andersen <tycho@tycho.ws>
Link: https://lore.kernel.org/r/20191229062451.9467-2-sargun@sargun.me
Fixes: 6a21cc50f0c7 ("seccomp: add a return code to trap to userspace")
Cc: stable@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'sound')
0 files changed, 0 insertions, 0 deletions