[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20181209182414.30862-1-tycho@tycho.ws>
Date: Sun, 9 Dec 2018 11:24:10 -0700
From: Tycho Andersen <tycho@...ho.ws>
To: Kees Cook <keescook@...omium.org>
Cc: Andy Lutomirski <luto@...capital.net>,
Oleg Nesterov <oleg@...hat.com>,
"Eric W . Biederman" <ebiederm@...ssion.com>,
"Serge E . Hallyn" <serge@...lyn.com>,
Christian Brauner <christian@...uner.io>,
Tyler Hicks <tyhicks@...onical.com>,
Akihiro Suda <suda.akihiro@....ntt.co.jp>,
Aleksa Sarai <asarai@...e.de>, Jann Horn <jannh@...gle.com>,
linux-kernel@...r.kernel.org,
containers@...ts.linux-foundation.org, linux-api@...r.kernel.org,
Tycho Andersen <tycho@...ho.ws>
Subject: [PATCH v10 0/4] seccomp trap to userspace
Hi all,
Here's v10 of the seccomp trap to userspace series. The only changes
since v9 was to fix up a compilation error in the
!CONFIG_ARCH_HAS_SYSCALL_WRAPPER case, and to add Serge's acks.
Link to v9: https://lore.kernel.org/lkml/20181203032827.27978-1-tycho@tycho.ws/T/#u
Cheers,
Tycho
Tycho Andersen (4):
seccomp: hoist struct seccomp_data recalculation higher
seccomp: switch system call argument type to void *
seccomp: add a return code to trap to userspace
samples: add an example of seccomp user trap
Documentation/ioctl/ioctl-number.txt | 1 +
.../userspace-api/seccomp_filter.rst | 84 ++++
include/linux/seccomp.h | 9 +-
include/linux/syscalls.h | 2 +-
include/uapi/linux/seccomp.h | 40 +-
kernel/seccomp.c | 468 +++++++++++++++++-
samples/seccomp/.gitignore | 1 +
samples/seccomp/Makefile | 7 +-
samples/seccomp/user-trap.c | 375 ++++++++++++++
tools/testing/selftests/seccomp/seccomp_bpf.c | 447 ++++++++++++++++-
10 files changed, 1411 insertions(+), 23 deletions(-)
create mode 100644 samples/seccomp/user-trap.c
--
2.19.1
Powered by blists - more mailing lists