1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556 |
- /*
- * linux/kernel/seccomp.c
- *
- * Copyright 2004-2005 Andrea Arcangeli <andrea@cpushare.com>
- *
- * This defines a simple but solid secure-computing mode.
- */
- #include <linux/seccomp.h>
- #include <linux/sched.h>
- /* #define SECCOMP_DEBUG 1 */
- /*
- * Secure computing mode 1 allows only read/write/exit/sigreturn.
- * To be fully secure this must be combined with rlimit
- * to limit the stack allocations too.
- */
- static int mode1_syscalls[] = {
- __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn,
- 0, /* null terminated */
- };
- #ifdef TIF_32BIT
- static int mode1_syscalls_32[] = {
- __NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32,
- 0, /* null terminated */
- };
- #endif
- void __secure_computing(int this_syscall)
- {
- int mode = current->seccomp.mode;
- int * syscall;
- switch (mode) {
- case 1:
- syscall = mode1_syscalls;
- #ifdef TIF_32BIT
- if (test_thread_flag(TIF_32BIT))
- syscall = mode1_syscalls_32;
- #endif
- do {
- if (*syscall == this_syscall)
- return;
- } while (*++syscall);
- break;
- default:
- BUG();
- }
- #ifdef SECCOMP_DEBUG
- dump_stack();
- #endif
- do_exit(SIGKILL);
- }
|