]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | #ifndef _LINUX_SECCOMP_H |
2 | #define _LINUX_SECCOMP_H | |
3 | ||
e2cfabdf WD |
4 | #include <linux/compiler.h> |
5 | #include <linux/types.h> | |
6 | ||
7 | ||
8 | /* Valid values for seccomp.mode and prctl(PR_SET_SECCOMP, <mode>) */ | |
9 | #define SECCOMP_MODE_DISABLED 0 /* seccomp is not in use. */ | |
10 | #define SECCOMP_MODE_STRICT 1 /* uses hard-coded filter. */ | |
11 | #define SECCOMP_MODE_FILTER 2 /* uses user-supplied filter. */ | |
12 | ||
13 | /* | |
14 | * All BPF programs must return a 32-bit value. | |
acf3b2c7 | 15 | * The bottom 16-bits are for optional return data. |
e2cfabdf WD |
16 | * The upper 16-bits are ordered from least permissive values to most. |
17 | * | |
18 | * The ordering ensures that a min_t() over composed return values always | |
19 | * selects the least permissive choice. | |
20 | */ | |
21 | #define SECCOMP_RET_KILL 0x00000000U /* kill the task immediately */ | |
bb6ea430 | 22 | #define SECCOMP_RET_TRAP 0x00030000U /* disallow and force a SIGSYS */ |
acf3b2c7 | 23 | #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ |
fb0fadf9 | 24 | #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ |
e2cfabdf WD |
25 | #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ |
26 | ||
27 | /* Masks for the return value sections. */ | |
28 | #define SECCOMP_RET_ACTION 0x7fff0000U | |
29 | #define SECCOMP_RET_DATA 0x0000ffffU | |
30 | ||
31 | /** | |
32 | * struct seccomp_data - the format the BPF program executes over. | |
33 | * @nr: the system call number | |
34 | * @arch: indicates system call convention as an AUDIT_ARCH_* value | |
35 | * as defined in <linux/audit.h>. | |
36 | * @instruction_pointer: at the time of the system call. | |
37 | * @args: up to 6 system call arguments always stored as 64-bit values | |
38 | * regardless of the architecture. | |
39 | */ | |
40 | struct seccomp_data { | |
41 | int nr; | |
42 | __u32 arch; | |
43 | __u64 instruction_pointer; | |
44 | __u64 args[6]; | |
45 | }; | |
1da177e4 | 46 | |
e2cfabdf | 47 | #ifdef __KERNEL__ |
1da177e4 LT |
48 | #ifdef CONFIG_SECCOMP |
49 | ||
1da177e4 LT |
50 | #include <linux/thread_info.h> |
51 | #include <asm/seccomp.h> | |
52 | ||
e2cfabdf WD |
53 | struct seccomp_filter; |
54 | /** | |
55 | * struct seccomp - the state of a seccomp'ed process | |
56 | * | |
57 | * @mode: indicates one of the valid values above for controlled | |
58 | * system calls available to a process. | |
59 | * @filter: The metadata and ruleset for determining what system calls | |
60 | * are allowed for a task. | |
61 | * | |
62 | * @filter must only be accessed from the context of current as there | |
63 | * is no locking. | |
64 | */ | |
932ecebb WD |
65 | struct seccomp { |
66 | int mode; | |
e2cfabdf | 67 | struct seccomp_filter *filter; |
932ecebb | 68 | }; |
1da177e4 | 69 | |
acf3b2c7 WD |
70 | extern int __secure_computing(int); |
71 | static inline int secure_computing(int this_syscall) | |
1da177e4 LT |
72 | { |
73 | if (unlikely(test_thread_flag(TIF_SECCOMP))) | |
acf3b2c7 WD |
74 | return __secure_computing(this_syscall); |
75 | return 0; | |
1da177e4 LT |
76 | } |
77 | ||
1d9d02fe | 78 | extern long prctl_get_seccomp(void); |
e2cfabdf | 79 | extern long prctl_set_seccomp(unsigned long, char __user *); |
1d9d02fe | 80 | |
932ecebb | 81 | static inline int seccomp_mode(struct seccomp *s) |
5cec93c2 AL |
82 | { |
83 | return s->mode; | |
84 | } | |
85 | ||
1da177e4 LT |
86 | #else /* CONFIG_SECCOMP */ |
87 | ||
42a17ad2 RB |
88 | #include <linux/errno.h> |
89 | ||
932ecebb | 90 | struct seccomp { }; |
e2cfabdf | 91 | struct seccomp_filter { }; |
1da177e4 | 92 | |
b1fa650c | 93 | static inline int secure_computing(int this_syscall) { return 0; } |
1da177e4 | 94 | |
1d9d02fe AA |
95 | static inline long prctl_get_seccomp(void) |
96 | { | |
97 | return -EINVAL; | |
98 | } | |
99 | ||
e2cfabdf | 100 | static inline long prctl_set_seccomp(unsigned long arg2, char __user *arg3) |
1d9d02fe AA |
101 | { |
102 | return -EINVAL; | |
103 | } | |
104 | ||
932ecebb | 105 | static inline int seccomp_mode(struct seccomp *s) |
5cec93c2 AL |
106 | { |
107 | return 0; | |
108 | } | |
1da177e4 LT |
109 | #endif /* CONFIG_SECCOMP */ |
110 | ||
e2cfabdf WD |
111 | #ifdef CONFIG_SECCOMP_FILTER |
112 | extern void put_seccomp_filter(struct task_struct *tsk); | |
113 | extern void get_seccomp_filter(struct task_struct *tsk); | |
114 | extern u32 seccomp_bpf_load(int off); | |
115 | #else /* CONFIG_SECCOMP_FILTER */ | |
116 | static inline void put_seccomp_filter(struct task_struct *tsk) | |
117 | { | |
118 | return; | |
119 | } | |
120 | static inline void get_seccomp_filter(struct task_struct *tsk) | |
121 | { | |
122 | return; | |
123 | } | |
124 | #endif /* CONFIG_SECCOMP_FILTER */ | |
125 | #endif /* __KERNEL__ */ | |
1da177e4 | 126 | #endif /* _LINUX_SECCOMP_H */ |