Function report |
Source Code:kernel\seccomp.c |
Create Date:2022-07-28 11:46:10 |
Last Modify:2022-05-19 16:58:48 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:__secure_computing_strict
Proto:static void __secure_computing_strict(int this_syscall)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
int | this_syscall |
690 | syscall_whitelist = Secure computing mode 1 allows only read/write/exit/sigreturn.* To be fully secure this must be combined with rlimit* to limit the stack allocations too. |
692 | If in_compat_syscall() Then syscall_whitelist = get_compat_mode1_syscalls() |
695 | Do |
696 | If syscall_whitelist == this_syscall Then Return |
698 | When *++syscall_whitelist cycle |
703 | seccomp_log(this_syscall, SIGKILL, kill the thread , true) |
Name | Describe |
---|---|
secure_computing_strict |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |