Re: [PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-13 Thread Kees Cook
On Mon, Feb 13, 2017 at 4:25 PM, Tyler Hicks wrote: > kmemleak doesn't complain if we save it to a global. That makes sense > because it means that we have a persistent reference to the allocated > memory. > > However, kmemleak doesn't complain about this allocation as-is (meaning > that I simply

Re: [PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-13 Thread Tyler Hicks
On 02/07/2017 06:43 PM, Kees Cook wrote: > On Tue, Feb 7, 2017 at 4:25 PM, Tyler Hicks wrote: >> On 02/07/2017 06:03 PM, Kees Cook wrote: >>> On Thu, Feb 2, 2017 at 9:37 PM, Tyler Hicks wrote: This patch creates a read-only sysctl containing an ordered list of seccomp actions that the k

Re: [PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-07 Thread Tyler Hicks
On 02/07/2017 06:03 PM, Kees Cook wrote: > On Thu, Feb 2, 2017 at 9:37 PM, Tyler Hicks wrote: >> This patch creates a read-only sysctl containing an ordered list of >> seccomp actions that the kernel supports. The ordering, from left to >> right, is the lowest action value (kill) to the highest ac

Re: [PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-07 Thread Kees Cook
On Tue, Feb 7, 2017 at 4:25 PM, Tyler Hicks wrote: > On 02/07/2017 06:03 PM, Kees Cook wrote: >> On Thu, Feb 2, 2017 at 9:37 PM, Tyler Hicks wrote: >>> This patch creates a read-only sysctl containing an ordered list of >>> seccomp actions that the kernel supports. The ordering, from left to >>>

Re: [PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-07 Thread Kees Cook
On Thu, Feb 2, 2017 at 9:37 PM, Tyler Hicks wrote: > This patch creates a read-only sysctl containing an ordered list of > seccomp actions that the kernel supports. The ordering, from left to > right, is the lowest action value (kill) to the highest action value > (allow). Currently, a read of the

[PATCH v2 1/4] seccomp: Add sysctl to display available actions

2017-02-02 Thread Tyler Hicks
This patch creates a read-only sysctl containing an ordered list of seccomp actions that the kernel supports. The ordering, from left to right, is the lowest action value (kill) to the highest action value (allow). Currently, a read of the sysctl file would return "kill trap errno trace allow". The