[PATCH] apparmor: Fix harmless off by one in map_signal_num()

John Johansen john.johansen at canonical.com
Mon Sep 25 16:27:08 UTC 2017


On 09/25/2017 11:09 AM, Dan Carpenter wrote:
> On Mon, Sep 25, 2017 at 10:25:01AM -0400, John Johansen wrote:
>> On 09/01/2017 04:52 AM, Dan Carpenter wrote:
>>> This patch has no effect on runtime.
>>>
>>> The sig_map[] array has MAXMAPPED_SIG (35) members so my static checker
>>> complains that the <= should be <.  But in this case it's not possible
>>> for "sig" to be more than 31 because of the "else if (sig >= SIGRTMIN)"
>>> condition since SIGRTMIN is 32.  The last three elements, 32-34, of
>>> sig_map[] are empty so this code works as designed.
>>>
>>> Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com>
>>>
>>> diff --git a/security/apparmor/ipc.c b/security/apparmor/ipc.c
>>> index 66fb9ede9447..5091c78062e4 100644
>>> --- a/security/apparmor/ipc.c
>>> +++ b/security/apparmor/ipc.c
>>> @@ -128,7 +128,7 @@ static inline int map_signal_num(int sig)
>>>  		return SIGUNKNOWN;
>>>  	else if (sig >= SIGRTMIN)
>>>  		return sig - SIGRTMIN + 128;	/* rt sigs mapped to 128 */
>>> -	else if (sig <= MAXMAPPED_SIG)
>>> +	else if (sig < MAXMAPPED_SIG)
>>>  		return sig_map[sig];
>>>  	return SIGUNKNOWN;
>>>  }
>>>
>>
>> Colin King beat you to this one, its in apparmor-next
> 
> apparmor doesn't seem to be in linux-next at all.  Why is that?
> 
hrmmm, apparmor is pulled in via security-next merges, but you are right
apparmor-next isn't being merged and we should set that up.

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list