Files
kernel_xiaomi_sm8250/include/uapi/linux
Kees Cook 48dc92b9fc seccomp: add "seccomp" syscall
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).

In addition to the TSYNC flag later in this patch series, there is a
non-zero chance that this syscall could be used for configuring a fixed
argument area for seccomp-tracer-aware processes to pass syscall arguments
in the future. Hence, the use of "seccomp" not simply "seccomp_add_filter"
for this syscall. Additionally, this syscall uses operation, flags,
and user pointer for arguments because strictly passing arguments via
a user pointer would mean seccomp itself would be unable to trivially
filter the seccomp syscall itself.

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
2014-07-18 12:13:37 -07:00
..
2014-05-08 12:43:03 -04:00
2014-03-20 14:55:18 +01:00
2013-11-09 18:20:22 -05:00
2014-04-22 21:27:57 -04:00
2014-04-01 17:08:43 +02:00
2014-04-28 16:43:44 +02:00
2014-05-14 10:04:34 +01:00
2013-12-11 12:57:55 -08:00
2013-08-21 12:21:45 -07:00
2013-12-08 11:01:47 +01:00
2013-11-27 11:03:38 -08:00
2014-03-04 13:51:06 -05:00
2014-06-13 10:53:49 -04:00
2014-01-06 15:13:01 -05:00
2014-03-21 14:21:13 -04:00
2013-12-06 12:37:56 -05:00
2014-07-18 12:13:37 -07:00
2014-04-25 10:08:48 -07:00
2014-04-24 16:16:33 -07:00
2014-04-26 12:13:24 -04:00
2013-12-11 09:25:20 -02:00
2014-03-07 08:12:37 +01:00