This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Seccomp implications for glibc wrapper function changes
- From: "Michael Kerrisk (man-pages)" <mtk dot manpages at gmail dot com>
- To: "libc-alpha at sourceware dot org" <libc-alpha at sourceware dot org>
- Cc: Linux API <linux-api at vger dot kernel dot org>, Adhemerval Zanella <adhemerval dot zanella at linaro dot org>, Michael Kerrisk <mtk dot manpages at gmail dot com>
- Date: Tue, 7 Nov 2017 21:35:25 +0100
- Subject: Seccomp implications for glibc wrapper function changes
- Authentication-results: sourceware.org; auth=none
- Reply-to: mtk dot manpages at gmail dot com
Hello,
I was recently testing some code I'd written a while back that makes
use of seccomp filters to control which system calls a process can
make, and I got a surpise when someone showed the code no longer
worked in on a system that had glibc 2.26.
The behavior change resulted from Adhemerval's glibc commit
commit b41152d716ee9c5ba34495a54e64ea2b732139b5
Author: Adhemerval Zanella <adhemerval.zanella@linaro.org>
Date: Fri Nov 11 15:00:03 2016 -0200
Consolidate Linux open implementation
[...]
3. Use __NR_openat as default syscall for open{64}.
The commit in question changed the glibc open() wrapper to swtcch from
use the kernel's open() system call to using the kernel's openat()
system call.
This change broke my code that was doing seccomp filtering for the
open() system call number (__NR_open). The breakage in question is not
serious, since this was really just demonstration code. However, I
want to raise awareness that these sorts of changes have the potential
to possibly cause breakages for some code using seccomp, and note that
I think such changes should not be made lightly or gratuitously. (In
the above commit, it's not clear why the switch was made to using
openat(): there's no mention of the reasoning in the commit message,
nor is there anything that is obvious from reading through the code
change itself.)
Best regards,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/