Fix 'seccomp: add "seccomp" syscall'
This adds the new "seccomp" syscall with both an "operation" and "flags" parameter for future expansion. The third argument is a pointer value, used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...). In addition to the TSYNC flag later in this patch series, there is a non-zero chance that this syscall could be used for configuring a fixed argument area for seccomp-tracer-aware processes to pass syscall arguments in the future. Hence, the use of "seccomp" not simply "seccomp_add_filter" for this syscall. Additionally, this syscall uses operation, flags, and user pointer for arguments because strictly passing arguments via a user pointer would mean seccomp itself would be unable to trivially filter the seccomp syscall itself. Signed-off-by:Kees Cook <keescook@chromium.org> Reviewed-by:
Oleg Nesterov <oleg@redhat.com> Reviewed-by:
Andy Lutomirski <luto@amacapital.net> Git-commit: e985fd474debedb269fba27006eda50d0b6f07ef Git-repo: https://android.googlesource.com/kernel/common.git [imaund@codeaurora.org: The values assigned to seccomp are already in use by sched_setattr and sched_getattr. Instead, use the next available values.] [mikeioannina]: Reapply patch from msm8994 kernel to add missing changes in arch/x86/syscalls to avoid future merge conflicts Signed-off-by:
Ian Maund <imaund@codeaurora.org> Change-Id: I15eed2882f965989ca8739dfbb43248029de46d2
Loading
Please register or sign in to comment