-
Notifications
You must be signed in to change notification settings - Fork 196
set_secure_computing_mode(SecureComputingMode::Filter)
has no filter argument
#1451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
There is a bug here, though it doesn't pass a garbage pointer; it uses
|
set_secure_computing_mode(SecureComputingMode::Filter)
passes a pointer to garbage to the kernelset_secure_computing_mode(SecureComputingMode::Filter)
has no filter argument
+1
This is still a valid return value of |
Ah. In that case we probably should deprecate Edit: |
|
Oops yes, |
So basically we deprecate |
Yeah, that sounds reasonable. It is less convenient if users want to change the mode dynamically, but that seems unlikely to be common. |
The C interface looks like
however rustix' iterface looks like
so
filter
will be some garbage, mostly likely failing withEFAULT
.Since
PR_SET_SECCOMP
(but notPR_GET_SECCOMP
) is deprecated and superseded byseccomp
anyway. Do you see a good reason to fix the prctl variant? Or should we just deprecated and later remove the prctl variant in rustix and add support forseccomp(2)
asseccomp_set_mode_strict()
andseccomp_set_mode_filter(flags, args)
?The text was updated successfully, but these errors were encountered: