diff options
author | Kees Cook <keescook@chromium.org> | 2014-06-25 16:08:24 -0700 |
---|---|---|
committer | JP Abgrall <jpa@google.com> | 2014-10-07 16:42:32 -0700 |
commit | e985fd474debedb269fba27006eda50d0b6f07ef (patch) | |
tree | 1f237073b14f6786f407522b6d5d42c1f7fc8529 /arch/arm64/include | |
parent | 8908dde5a7fdca974374b0dbe6dfb10f69df7216 (diff) |
seccomp: add "seccomp" syscall
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the TSYNC flag later in this patch series, there is a
non-zero chance that this syscall could be used for configuring a fixed
argument area for seccomp-tracer-aware processes to pass syscall arguments
in the future. Hence, the use of "seccomp" not simply "seccomp_add_filter"
for this syscall. Additionally, this syscall uses operation, flags,
and user pointer for arguments because strictly passing arguments via
a user pointer would mean seccomp itself would be unable to trivially
filter the seccomp syscall itself.
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
Conflicts:
arch/x86/syscalls/syscall_32.tbl
arch/x86/syscalls/syscall_64.tbl
include/uapi/asm-generic/unistd.h
kernel/seccomp.c
And fixup of unistd32.h to truly enable sys_secomp.
Change-Id: I95bea02382c52007d22e5e9dc563c7d055c2c83f
Diffstat (limited to 'arch/arm64/include')
-rw-r--r-- | arch/arm64/include/asm/unistd32.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm64/include/asm/unistd32.h b/arch/arm64/include/asm/unistd32.h index 63513ae2b59e..76d094565090 100644 --- a/arch/arm64/include/asm/unistd32.h +++ b/arch/arm64/include/asm/unistd32.h @@ -788,4 +788,4 @@ __SYSCALL(381, sys_ni_syscall) /* #define __NR_renameat2 382 */ __SYSCALL(382, sys_ni_syscall) #define __NR_seccomp 383 -__SYSCALL(__NR_seccomp, sys_ni_syscall) +__SYSCALL(__NR_seccomp, sys_seccomp) |