forked from luck/tmp_suning_uos_patched
57 lines
1.1 KiB
C
57 lines
1.1 KiB
C
|
/*
|
||
|
* linux/kernel/seccomp.c
|
||
|
*
|
||
|
* Copyright 2004-2005 Andrea Arcangeli <andrea@cpushare.com>
|
||
|
*
|
||
|
* This defines a simple but solid secure-computing mode.
|
||
|
*/
|
||
|
|
||
|
#include <linux/seccomp.h>
|
||
|
#include <linux/sched.h>
|
||
|
|
||
|
/* #define SECCOMP_DEBUG 1 */
|
||
|
|
||
|
/*
|
||
|
* Secure computing mode 1 allows only read/write/exit/sigreturn.
|
||
|
* To be fully secure this must be combined with rlimit
|
||
|
* to limit the stack allocations too.
|
||
|
*/
|
||
|
static int mode1_syscalls[] = {
|
||
|
__NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn,
|
||
|
0, /* null terminated */
|
||
|
};
|
||
|
|
||
|
#ifdef TIF_32BIT
|
||
|
static int mode1_syscalls_32[] = {
|
||
|
__NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32,
|
||
|
0, /* null terminated */
|
||
|
};
|
||
|
#endif
|
||
|
|
||
|
void __secure_computing(int this_syscall)
|
||
|
{
|
||
|
int mode = current->seccomp.mode;
|
||
|
int * syscall;
|
||
|
|
||
|
switch (mode) {
|
||
|
case 1:
|
||
|
syscall = mode1_syscalls;
|
||
|
#ifdef TIF_32BIT
|
||
|
if (test_thread_flag(TIF_32BIT))
|
||
|
syscall = mode1_syscalls_32;
|
||
|
#endif
|
||
|
do {
|
||
|
if (*syscall == this_syscall)
|
||
|
return;
|
||
|
} while (*++syscall);
|
||
|
break;
|
||
|
default:
|
||
|
BUG();
|
||
|
}
|
||
|
|
||
|
#ifdef SECCOMP_DEBUG
|
||
|
dump_stack();
|
||
|
#endif
|
||
|
do_exit(SIGKILL);
|
||
|
}
|