blob: 57d4b13b631de36161349feb99ae6f76a2984b06 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/kernel/seccomp.c
3 *
4 * Copyright 2004-2005 Andrea Arcangeli <andrea@cpushare.com>
5 *
6 * This defines a simple but solid secure-computing mode.
7 */
8
9#include <linux/seccomp.h>
10#include <linux/sched.h>
Roland McGrath5b101742009-02-27 23:25:54 -080011#include <linux/compat.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012
13/* #define SECCOMP_DEBUG 1 */
Andrea Arcangeli1d9d02f2007-07-15 23:41:32 -070014#define NR_SECCOMP_MODES 1
Linus Torvalds1da177e2005-04-16 15:20:36 -070015
16/*
17 * Secure computing mode 1 allows only read/write/exit/sigreturn.
18 * To be fully secure this must be combined with rlimit
19 * to limit the stack allocations too.
20 */
21static int mode1_syscalls[] = {
22 __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn,
23 0, /* null terminated */
24};
25
Roland McGrath5b101742009-02-27 23:25:54 -080026#ifdef CONFIG_COMPAT
Linus Torvalds1da177e2005-04-16 15:20:36 -070027static int mode1_syscalls_32[] = {
28 __NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32,
29 0, /* null terminated */
30};
31#endif
32
33void __secure_computing(int this_syscall)
34{
35 int mode = current->seccomp.mode;
36 int * syscall;
37
38 switch (mode) {
39 case 1:
40 syscall = mode1_syscalls;
Roland McGrath5b101742009-02-27 23:25:54 -080041#ifdef CONFIG_COMPAT
42 if (is_compat_task())
Linus Torvalds1da177e2005-04-16 15:20:36 -070043 syscall = mode1_syscalls_32;
44#endif
45 do {
46 if (*syscall == this_syscall)
47 return;
48 } while (*++syscall);
49 break;
50 default:
51 BUG();
52 }
53
54#ifdef SECCOMP_DEBUG
55 dump_stack();
56#endif
57 do_exit(SIGKILL);
58}
Andrea Arcangeli1d9d02f2007-07-15 23:41:32 -070059
60long prctl_get_seccomp(void)
61{
62 return current->seccomp.mode;
63}
64
65long prctl_set_seccomp(unsigned long seccomp_mode)
66{
67 long ret;
68
69 /* can set it only once to be even more secure */
70 ret = -EPERM;
71 if (unlikely(current->seccomp.mode))
72 goto out;
73
74 ret = -EINVAL;
75 if (seccomp_mode && seccomp_mode <= NR_SECCOMP_MODES) {
76 current->seccomp.mode = seccomp_mode;
77 set_thread_flag(TIF_SECCOMP);
Andrea Arcangelicf99aba2007-07-15 23:41:33 -070078#ifdef TIF_NOTSC
79 disable_TSC();
80#endif
Andrea Arcangeli1d9d02f2007-07-15 23:41:32 -070081 ret = 0;
82 }
83
84 out:
85 return ret;
86}