| Support buggy LG kernels when detecting seccomp | |||
| Project Member Reported by jln@chromium.org, Apr 20 2015 | Back to list | ||
Some LG Android kernels implement a system call whose number collides with sys_seccomp. Try to work around this. Retrieved from https://github.com/AndroidAddict92/android_kernel_lge_w5/blob/1c30c23792516fc9092576ccaa033a84dcec6238/fs/LGSDEncManager.c /* * Saves extension list of media file */ asmlinkage long sys_set_media_ext(char *mediaExtList) { memset(savedfileExtList, 0, sizeof(savedfileExtList)); if(mediaExtList != NULL){ strncpy(savedfileExtList, mediaExtList, strlen(mediaExtList)); } // printk("%s :: savedfileExtList: %s\n", __func__,savedfileExtList); return 1; }
Comment 1
by
jln@chromium.org,
Apr 20 2015
,
Apr 20 2015
https://chromiumcodereview.appspot.com/1095133003/ up for review.
,
Apr 23 2015
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/c08969c1b8b723494569c893b15c9b2e634ef0fc commit c08969c1b8b723494569c893b15c9b2e634ef0fc Author: jln <jln@chromium.org> Date: Thu Apr 23 22:07:49 2015 Linux sandbox: workaround colliding system call. Some Android kernels have system calls that collide with sys_seccomp, try to detect this situation. BUG= 478891 Review URL: https://codereview.chromium.org/1095133003 Cr-Commit-Position: refs/heads/master@{#326667} [modify] http://crrev.com/c08969c1b8b723494569c893b15c9b2e634ef0fc/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
,
Apr 29 2015
|
|||
| ► Sign in to add a comment | |||