mirror of
https://github.com/torvalds/linux.git
synced 2024-12-13 22:53:20 +00:00
a1ae65b219
secure_computing() is called first in syscall_trace_enter() so that a system call will be aborted quickly without doing succeeding syscall tracing if seccomp rules want to deny that system call. On compat task, syscall numbers for system calls allowed in seccomp mode 1 are different from those on normal tasks, and so _NR_seccomp_xxx_32's need to be redefined. Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org> Signed-off-by: Will Deacon <will.deacon@arm.com>
26 lines
714 B
C
26 lines
714 B
C
/*
|
|
* arch/arm64/include/asm/seccomp.h
|
|
*
|
|
* Copyright (C) 2014 Linaro Limited
|
|
* Author: AKASHI Takahiro <takahiro.akashi@linaro.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*/
|
|
#ifndef _ASM_SECCOMP_H
|
|
#define _ASM_SECCOMP_H
|
|
|
|
#include <asm/unistd.h>
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
#define __NR_seccomp_read_32 __NR_compat_read
|
|
#define __NR_seccomp_write_32 __NR_compat_write
|
|
#define __NR_seccomp_exit_32 __NR_compat_exit
|
|
#define __NR_seccomp_sigreturn_32 __NR_compat_rt_sigreturn
|
|
#endif /* CONFIG_COMPAT */
|
|
|
|
#include <asm-generic/seccomp.h>
|
|
|
|
#endif /* _ASM_SECCOMP_H */
|