linux_dsm_epyc7002/arch/x86/syscalls
Kees Cook 48dc92b9fc seccomp: add "seccomp" syscall
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).

In addition to the TSYNC flag later in this patch series, there is a
non-zero chance that this syscall could be used for configuring a fixed
argument area for seccomp-tracer-aware processes to pass syscall arguments
in the future. Hence, the use of "seccomp" not simply "seccomp_add_filter"
for this syscall. Additionally, this syscall uses operation, flags,
and user pointer for arguments because strictly passing arguments via
a user pointer would mean seccomp itself would be unable to trivially
filter the seccomp syscall itself.

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
2014-07-18 12:13:37 -07:00
..
Makefile x86/build: Supress "Nothing to be done for ..." messages 2014-04-14 11:44:36 +02:00
syscall_32.tbl seccomp: add "seccomp" syscall 2014-07-18 12:13:37 -07:00
syscall_64.tbl seccomp: add "seccomp" syscall 2014-07-18 12:13:37 -07:00
syscallhdr.sh x86, syscall: Allow syscall offset to be symbolic 2011-11-18 17:01:19 -08:00
syscalltbl.sh x86: Machine-readable syscall tables and scripts to process them 2011-11-17 13:35:36 -08:00