switch-linux/include/uapi/asm-generic
Kees Cook 48dc92b9fc seccomp: add "seccomp" syscall
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).

In addition to the TSYNC flag later in this patch series, there is a
non-zero chance that this syscall could be used for configuring a fixed
argument area for seccomp-tracer-aware processes to pass syscall arguments
in the future. Hence, the use of "seccomp" not simply "seccomp_add_filter"
for this syscall. Additionally, this syscall uses operation, flags,
and user pointer for arguments because strictly passing arguments via
a user pointer would mean seccomp itself would be unable to trivially
filter the seccomp syscall itself.

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
2014-07-18 12:13:37 -07:00
..
auxvec.h
bitsperlong.h
errno-base.h
errno.h
fcntl.h locks: rename file-private locks to "open file description locks" 2014-04-22 08:23:58 -04:00
int-l64.h
int-ll64.h
ioctl.h
ioctls.h
ipcbuf.h
Kbuild
Kbuild.asm
kvm_para.h
mman-common.h madvise: correct the comment of MADV_DODUMP flag 2014-04-07 16:35:58 -07:00
mman.h
msgbuf.h
param.h
poll.h
posix_types.h
resource.h asm-generic: remove _STK_LIM_MAX 2014-05-15 00:32:09 +01:00
sembuf.h
setup.h
shmbuf.h
shmparam.h
siginfo.h
signal-defs.h
signal.h
socket.h
sockios.h
stat.h
statfs.h
swab.h
termbits.h
termios.h
types.h
ucontext.h
unistd.h seccomp: add "seccomp" syscall 2014-07-18 12:13:37 -07:00