-
Notifications
You must be signed in to change notification settings - Fork 194
set_secure_computing_mode(SecureComputingMode::Filter)
has no filter argument
#1451
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Comments
There is a bug here, though it doesn't pass a garbage pointer; it uses
|
set_secure_computing_mode(SecureComputingMode::Filter)
passes a pointer to garbage to the kernelset_secure_computing_mode(SecureComputingMode::Filter)
has no filter argument
+1
This is still a valid return value of |
Ah. In that case we probably should deprecate Edit: |
|
Oops yes, |
So basically we deprecate |
Yeah, that sounds reasonable. It is less convenient if users want to change the mode dynamically, but that seems unlikely to be common. |
The C interface looks like
however rustix' iterface looks like
so
filter
will be some garbage, mostly likely failing withEFAULT
.Since
PR_SET_SECCOMP
(but notPR_GET_SECCOMP
) is deprecated and superseded byseccomp
anyway. Do you see a good reason to fix the prctl variant? Or should we just deprecated and later remove the prctl variant in rustix and add support forseccomp(2)
asseccomp_set_mode_strict()
andseccomp_set_mode_filter(flags, args)
?The text was updated successfully, but these errors were encountered: