commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 1 | /* |
| 2 | * seccomp example for x86 (32-bit and 64-bit) with BPF macros |
| 3 | * |
| 4 | * Copyright (c) 2012 The Chromium OS Authors <chromium-os-dev@chromium.org> |
| 5 | * Authors: |
| 6 | * Will Drewry <wad@chromium.org> |
| 7 | * Kees Cook <keescook@chromium.org> |
| 8 | * |
| 9 | * Use of this source code is governed by a BSD-style license that can be |
| 10 | * found in the LICENSE file. |
| 11 | * |
| 12 | * A stripped down version of the file found in this tutorial: http://outflux.net/teach-seccomp/. |
| 13 | */ |
| 14 | #ifndef _SECCOMP_BPF_H_ |
| 15 | #define _SECCOMP_BPF_H_ |
| 16 | |
| 17 | #define _GNU_SOURCE 1 |
| 18 | #include <stdio.h> |
| 19 | #include <stddef.h> |
| 20 | #include <stdlib.h> |
| 21 | #include <errno.h> |
| 22 | #include <signal.h> |
| 23 | #include <string.h> |
| 24 | #include <unistd.h> |
| 25 | |
| 26 | #include <sys/prctl.h> |
commit-bot@chromium.org | d6cab4a | 2014-04-09 21:35:18 +0000 | [diff] [blame] | 27 | #ifndef PR_SET_NO_NEW_PRIVS |
| 28 | # define PR_SET_NO_NEW_PRIVS 38 |
| 29 | #endif |
commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 30 | |
| 31 | #include <linux/unistd.h> |
| 32 | #include <linux/audit.h> |
| 33 | #include <linux/filter.h> |
commit-bot@chromium.org | d6cab4a | 2014-04-09 21:35:18 +0000 | [diff] [blame] | 34 | #ifdef HAVE_LINUX_SECCOMP_H |
| 35 | # include <linux/seccomp.h> |
| 36 | #endif |
| 37 | #ifndef SECCOMP_MODE_FILTER |
| 38 | # define SECCOMP_MODE_FILTER 2 /* uses user-supplied filter. */ |
| 39 | # define SECCOMP_RET_KILL 0x00000000U /* kill the task immediately */ |
| 40 | # define SECCOMP_RET_TRAP 0x00030000U /* disallow and force a SIGSYS */ |
| 41 | # define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ |
| 42 | struct seccomp_data { |
| 43 | int nr; |
| 44 | __u32 arch; |
| 45 | __u64 instruction_pointer; |
| 46 | __u64 args[6]; |
| 47 | }; |
| 48 | #endif |
| 49 | #ifndef SYS_SECCOMP |
| 50 | # define SYS_SECCOMP 1 |
| 51 | #endif |
commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 52 | |
| 53 | #define syscall_nr (offsetof(struct seccomp_data, nr)) |
| 54 | |
| 55 | #define EXAMINE_SYSCALL \ |
skia.committer@gmail.com | 6b43f50 | 2014-04-10 03:05:44 +0000 | [diff] [blame] | 56 | BPF_STMT(BPF_LD+BPF_W+BPF_ABS, syscall_nr) |
commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 57 | |
| 58 | #define ALLOW_SYSCALL(name) \ |
skia.committer@gmail.com | 6b43f50 | 2014-04-10 03:05:44 +0000 | [diff] [blame] | 59 | BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_##name, 0, 1), \ |
| 60 | BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) |
commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 61 | |
| 62 | #define KILL_PROCESS \ |
skia.committer@gmail.com | 6b43f50 | 2014-04-10 03:05:44 +0000 | [diff] [blame] | 63 | BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL) |
commit-bot@chromium.org | 6d036c2 | 2014-04-09 18:59:44 +0000 | [diff] [blame] | 64 | |
| 65 | #endif /* _SECCOMP_BPF_H_ */ |