Loading...
/* * linux/kernel/seccomp.c * * Copyright 2004-2005 Andrea Arcangeli <andrea@cpushare.com> * * This defines a simple but solid secure-computing mode. */ #include <linux/seccomp.h> #include <linux/sched.h> /* #define SECCOMP_DEBUG 1 */ /* * Secure computing mode 1 allows only read/write/exit/sigreturn. * To be fully secure this must be combined with rlimit * to limit the stack allocations too. */ static int mode1_syscalls[] = { __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn, 0, /* null terminated */ }; #ifdef TIF_32BIT static int mode1_syscalls_32[] = { __NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32, 0, /* null terminated */ }; #endif void __secure_computing(int this_syscall) { int mode = current->seccomp.mode; int * syscall; switch (mode) { case 1: syscall = mode1_syscalls; #ifdef TIF_32BIT if (test_thread_flag(TIF_32BIT)) syscall = mode1_syscalls_32; #endif do { if (*syscall == this_syscall) return; } while (*++syscall); break; default: BUG(); } #ifdef SECCOMP_DEBUG dump_stack(); #endif do_exit(SIGKILL); } |