Home
last modified time | relevance | path

Searched refs:seccomp (Results 1 – 25 of 85) sorted by relevance

1234

/linux/Documentation/translations/zh_CN/userspace-api/
H A Dseccomp_filter.rst29 此外,BPF让seccomp用户不再成为在系统调用干预框架(system call interposition
45 添加了一个额外的seccomp模式,它可以使用和严格seccomp相同的 prctl(2) 调用来启用。
76 一个seccomp过滤器可能返回下列任意值。如果多个过滤器存在,评估一个指定系统调用的
100seccomp触发的 ``SIGSYS`` 会有一个 ``SYS_SECCOMP`` 的 si_code 。
121 在追踪器被通知后,seccomp检查不会再次运行。(这意味着基于seccomp的沙箱必须禁止
149 ``samples/seccomp/`` 文件夹包含了x86专用和更通用的使用高层宏接口来生成BPF程序的
155 ``SECCOMP_RET_USER_NOTIF`` 返回值会让seccomp过滤器传递一个特定的系统调用给用户
159 传递 ``SECCOMP_FILTER_FLAG_NEW_LISTENER`` 参数给 ``seccomp()`` 系统调用可以取
164 fd = seccomp(SECCOMP_SET_MODE_FILTER, SECCOMP_FILTER_FLAG_NEW_LISTENER, &prog);
171 seccomp通知文件描述符由两个结构体组成:
[all …]
H A Dno_new_privs.rst46 - 为seccomp模式2沙箱安装的过滤器会跨execve持久化,并能够改变新执行程序的行为。
/linux/kernel/
H A Dseccomp.c410 READ_ONCE(current->seccomp.filter); in seccomp_run_filters()
439 if (current->seccomp.mode && current->seccomp.mode != seccomp_mode) in seccomp_may_assign_mode()
453 task->seccomp.mode = seccomp_mode; in seccomp_assign_mode()
507 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED || in seccomp_can_sync_threads()
508 (thread->seccomp.mode == SECCOMP_MODE_FILTER && in seccomp_can_sync_threads()
509 is_ancestor(thread->seccomp.filter, in seccomp_can_sync_threads()
510 caller->seccomp.filter))) in seccomp_can_sync_threads()
577 if (READ_ONCE(tsk->seccomp.filter) == NULL) in seccomp_filter_release()
581 orig = tsk->seccomp.filter; in seccomp_filter_release()
583 tsk->seccomp.filter = NULL; in seccomp_filter_release()
[all …]
/linux/Documentation/userspace-api/
H A Dseccomp_filter.rst24 Additionally, BPF makes it impossible for users of seccomp to fall prey
46 An additional seccomp mode is added and is enabled using the same
47 prctl(2) call as the strict seccomp. If the architecture has
87 A seccomp filter may return any of the following values. If multiple
119 ``SIGSYS`` triggered by seccomp will have a si_code of ``SYS_SECCOMP``.
149 The seccomp check will not be run again after the tracer is
150 notified. (This means that seccomp-based sandboxes MUST NOT
187 The ``samples/seccomp/`` directory contains both an x86-specific example
194 The ``SECCOMP_RET_USER_NOTIF`` return code lets seccomp filters pass a
200 argument to the ``seccomp()`` syscall:
[all …]
H A Dno_new_privs.rst47 - Filters installed for the seccomp mode 2 sandbox persist across
/linux/include/linux/
H A Dseccomp_types.h22 struct seccomp { struct
30 struct seccomp { }; argument
H A Dseccomp.h41 static inline int seccomp_mode(struct seccomp *s) in seccomp_mode()
69 static inline int seccomp_mode(struct seccomp *s) in seccomp_mode()
/linux/arch/um/kernel/skas/
H A Dstub_exe.c50 if (!init_data.seccomp) in real_init()
72 if (init_data.seccomp) { in real_init()
85 if (!init_data.seccomp) { in real_init()
132 if (init_data.seccomp) { in real_init()
/linux/Documentation/features/seccomp/seccomp-filter/
H A Darch-support.txt2 # Feature name: seccomp-filter
4 # description: arch supports seccomp filters
/linux/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c304 #ifndef seccomp
305 int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
857 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, in kill_thread_or_group()
866 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog_thread)); in kill_thread_or_group()
2139 FIXTURE_VARIANT_ADD(TRACE_syscall, seccomp) { in FIXTURE_VARIANT_ADD() argument
2338 ret = seccomp(-1, 0, &prog); in TEST()
2347 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST()
2351 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST()
2357 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST()
2361 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST()
[all …]
/linux/samples/seccomp/
H A Duser-trap.c26 static int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
105 return seccomp(SECCOMP_SET_MODE_FILTER, flags, &prog); in user_trap_syscall()
297 if (seccomp(SECCOMP_GET_NOTIF_SIZES, 0, &sizes) < 0) { in main()
/linux/tools/perf/bench/
H A Dsched-seccomp-notify.c44 static int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
64 return seccomp(SECCOMP_SET_MODE_FILTER, flags, &prog); in user_notif_syscall()
H A DBuild3 perf-bench-y += sched-seccomp-notify.o
/linux/arch/um/include/shared/skas/
H A Dstub-data.h21 int seccomp; member
/linux/arch/arm64/include/asm/
H A DKbuild7 # same constants with prefixes, used by vdso, seccomp and sigreturn:
/linux/Documentation/translations/zh_CN/security/
H A Dself-protection.rst102seccomp”系统为用户空间提供了一种可选功能,提供了一种减少可供
H A Dlandlock.rst40 系统调用参数),后者是seccomp-bpf要侧重的。
/linux/include/uapi/linux/
H A Dptrace.h104 } seccomp; member
/linux/samples/
H A DMakefile22 subdir-$(CONFIG_SAMPLE_SECCOMP) += seccomp
/linux/rust/
H A Dbindgen_parameters26 # `seccomp`'s comment gets understood as a doctest
/linux/arch/mips/kernel/
H A Dscall64-n32.S79 bltz v0, 1f # seccomp failed? Skip syscall
H A Dscall64-n64.S89 bltz v0, 1f # seccomp failed? Skip syscall
/linux/init/
H A Dinit_task.c224 .seccomp = { .filter_count = ATOMIC_INIT(0) },
/linux/kernel/configs/
H A Dhardening.config89 # Provide userspace with seccomp BPF API for syscall attack surface reduction.
/linux/arch/
H A DKconfig619 An arch should select this symbol to support seccomp mode 1 (the fixed
621 and compat syscalls if the asm-generic/seccomp.h defaults need adjustment:
641 - seccomp syscall wired up
647 prompt "Enable seccomp to safely execute untrusted bytecode"
656 own address space using seccomp. Once seccomp is enabled via
657 prctl(PR_SET_SECCOMP) or the seccomp() syscall, it cannot be
659 syscalls defined by each seccomp mode.
674 bool "Show seccomp filter cache status in /proc/pid/seccomp_cache"
679 seccomp cache data. The file format is subject to change. Reading
683 an adversary may be able to infer the seccomp filter logic.

1234