| /* | 
 |  * linux/kernel/seccomp.c | 
 |  * | 
 |  * Copyright 2004-2005  Andrea Arcangeli <andrea@cpushare.com> | 
 |  * | 
 |  * This defines a simple but solid secure-computing mode. | 
 |  */ | 
 |  | 
 | #include <linux/seccomp.h> | 
 | #include <linux/sched.h> | 
 |  | 
 | /* #define SECCOMP_DEBUG 1 */ | 
 |  | 
 | /* | 
 |  * Secure computing mode 1 allows only read/write/exit/sigreturn. | 
 |  * To be fully secure this must be combined with rlimit | 
 |  * to limit the stack allocations too. | 
 |  */ | 
 | static int mode1_syscalls[] = { | 
 | 	__NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn, | 
 | 	0, /* null terminated */ | 
 | }; | 
 |  | 
 | #ifdef TIF_32BIT | 
 | static int mode1_syscalls_32[] = { | 
 | 	__NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32, | 
 | 	0, /* null terminated */ | 
 | }; | 
 | #endif | 
 |  | 
 | void __secure_computing(int this_syscall) | 
 | { | 
 | 	int mode = current->seccomp.mode; | 
 | 	int * syscall; | 
 |  | 
 | 	switch (mode) { | 
 | 	case 1: | 
 | 		syscall = mode1_syscalls; | 
 | #ifdef TIF_32BIT | 
 | 		if (test_thread_flag(TIF_32BIT)) | 
 | 			syscall = mode1_syscalls_32; | 
 | #endif | 
 | 		do { | 
 | 			if (*syscall == this_syscall) | 
 | 				return; | 
 | 		} while (*++syscall); | 
 | 		break; | 
 | 	default: | 
 | 		BUG(); | 
 | 	} | 
 |  | 
 | #ifdef SECCOMP_DEBUG | 
 | 	dump_stack(); | 
 | #endif | 
 | 	do_exit(SIGKILL); | 
 | } |