Skip to content
Commit 073e1eec authored by Dave Martin's avatar Dave Martin
Browse files

seccomp: Support IP-based syscall filtering



Syscalls coming from code that is maintained as part of the kernel
don't necessarily need to follow the generic syscall ABI.

To enable filters to disriminate userspace syscall sites that a
controlled by the kernel, add instruction pointer bounds to struct
seccomp_data.

Filters can check whether the userspace instruction pointer falls
within these bounds when a syscall is attempted, and can apply
whatever policy they like.

Signed-off-by: default avatarDave Martin <Dave.Martin@arm.com>
parent 0ecfebd2
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment