| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * linux/kernel/seccomp.c | 
|  | 3 | * | 
|  | 4 | * Copyright 2004-2005  Andrea Arcangeli <andrea@cpushare.com> | 
|  | 5 | * | 
|  | 6 | * This defines a simple but solid secure-computing mode. | 
|  | 7 | */ | 
|  | 8 |  | 
|  | 9 | #include <linux/seccomp.h> | 
|  | 10 | #include <linux/sched.h> | 
| Roland McGrath | 5b10174 | 2009-02-27 23:25:54 -0800 | [diff] [blame] | 11 | #include <linux/compat.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 12 |  | 
|  | 13 | /* #define SECCOMP_DEBUG 1 */ | 
| Andrea Arcangeli | 1d9d02f | 2007-07-15 23:41:32 -0700 | [diff] [blame] | 14 | #define NR_SECCOMP_MODES 1 | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 15 |  | 
|  | 16 | /* | 
|  | 17 | * Secure computing mode 1 allows only read/write/exit/sigreturn. | 
|  | 18 | * To be fully secure this must be combined with rlimit | 
|  | 19 | * to limit the stack allocations too. | 
|  | 20 | */ | 
|  | 21 | static int mode1_syscalls[] = { | 
|  | 22 | __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn, | 
|  | 23 | 0, /* null terminated */ | 
|  | 24 | }; | 
|  | 25 |  | 
| Roland McGrath | 5b10174 | 2009-02-27 23:25:54 -0800 | [diff] [blame] | 26 | #ifdef CONFIG_COMPAT | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 27 | static int mode1_syscalls_32[] = { | 
|  | 28 | __NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32, | 
|  | 29 | 0, /* null terminated */ | 
|  | 30 | }; | 
|  | 31 | #endif | 
|  | 32 |  | 
|  | 33 | void __secure_computing(int this_syscall) | 
|  | 34 | { | 
|  | 35 | int mode = current->seccomp.mode; | 
|  | 36 | int * syscall; | 
|  | 37 |  | 
|  | 38 | switch (mode) { | 
|  | 39 | case 1: | 
|  | 40 | syscall = mode1_syscalls; | 
| Roland McGrath | 5b10174 | 2009-02-27 23:25:54 -0800 | [diff] [blame] | 41 | #ifdef CONFIG_COMPAT | 
|  | 42 | if (is_compat_task()) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 43 | syscall = mode1_syscalls_32; | 
|  | 44 | #endif | 
|  | 45 | do { | 
|  | 46 | if (*syscall == this_syscall) | 
|  | 47 | return; | 
|  | 48 | } while (*++syscall); | 
|  | 49 | break; | 
|  | 50 | default: | 
|  | 51 | BUG(); | 
|  | 52 | } | 
|  | 53 |  | 
|  | 54 | #ifdef SECCOMP_DEBUG | 
|  | 55 | dump_stack(); | 
|  | 56 | #endif | 
|  | 57 | do_exit(SIGKILL); | 
|  | 58 | } | 
| Andrea Arcangeli | 1d9d02f | 2007-07-15 23:41:32 -0700 | [diff] [blame] | 59 |  | 
|  | 60 | long prctl_get_seccomp(void) | 
|  | 61 | { | 
|  | 62 | return current->seccomp.mode; | 
|  | 63 | } | 
|  | 64 |  | 
|  | 65 | long prctl_set_seccomp(unsigned long seccomp_mode) | 
|  | 66 | { | 
|  | 67 | long ret; | 
|  | 68 |  | 
|  | 69 | /* can set it only once to be even more secure */ | 
|  | 70 | ret = -EPERM; | 
|  | 71 | if (unlikely(current->seccomp.mode)) | 
|  | 72 | goto out; | 
|  | 73 |  | 
|  | 74 | ret = -EINVAL; | 
|  | 75 | if (seccomp_mode && seccomp_mode <= NR_SECCOMP_MODES) { | 
|  | 76 | current->seccomp.mode = seccomp_mode; | 
|  | 77 | set_thread_flag(TIF_SECCOMP); | 
| Andrea Arcangeli | cf99aba | 2007-07-15 23:41:33 -0700 | [diff] [blame] | 78 | #ifdef TIF_NOTSC | 
|  | 79 | disable_TSC(); | 
|  | 80 | #endif | 
| Andrea Arcangeli | 1d9d02f | 2007-07-15 23:41:32 -0700 | [diff] [blame] | 81 | ret = 0; | 
|  | 82 | } | 
|  | 83 |  | 
|  | 84 | out: | 
|  | 85 | return ret; | 
|  | 86 | } |