c50b4659e4
This brings SECCOMP_MODE_STRICT and SECCOMP_MODE_FILTER support through prctl(2) and seccomp(2) to User-mode Linux for i386 and x86_64 subarchitectures. secure_computing() is called first in handle_syscall() so that the syscall emulation will be aborted quickly if matching a seccomp rule. This is inspired from Meredydd Luff's patch (https://gerrit.chromium.org/gerrit/21425). Signed-off-by: Mickaël Salaün <mic@digikod.net> Cc: Jeff Dike <jdike@addtoit.com> Cc: Richard Weinberger <richard@nod.at> Cc: Ingo Molnar <mingo@redhat.com> Cc: Kees Cook <keescook@chromium.org> Cc: Andy Lutomirski <luto@amacapital.net> Cc: Will Drewry <wad@chromium.org> Cc: Chris Metcalf <cmetcalf@ezchip.com> Cc: Michael Ellerman <mpe@ellerman.id.au> Cc: James Hogan <james.hogan@imgtec.com> Cc: Meredydd Luff <meredydd@senatehouse.org> Cc: David Drysdale <drysdale@google.com> Signed-off-by: Richard Weinberger <richard@nod.at> Acked-by: Kees Cook <keescook@chromium.org> |
||
---|---|---|
.. | ||
skas | ||
asm-offsets.c | ||
config.c.in | ||
dyn.lds.S | ||
early_printk.c | ||
exec.c | ||
exitcode.c | ||
gmon_syms.c | ||
gprof_syms.c | ||
initrd.c | ||
irq.c | ||
kmsg_dump.c | ||
ksyms.c | ||
maccess.c | ||
Makefile | ||
mem.c | ||
physmem.c | ||
process.c | ||
ptrace.c | ||
reboot.c | ||
sigio.c | ||
signal.c | ||
stacktrace.c | ||
syscall.c | ||
sysrq.c | ||
time.c | ||
tlb.c | ||
trap.c | ||
um_arch.c | ||
umid.c | ||
uml.lds.S | ||
vmlinux.lds.S |