arch/arm: support seccomp
From: | Kees Cook <keescook@chromium.org> | |
To: | linux-kernel@vger.kernel.org | |
Subject: | [PATCH v3 0/4] arch/arm: support seccomp | |
Date: | Thu, 1 Nov 2012 17:14:56 -0700 | |
Message-ID: | <1351815300-28627-1-git-send-email-keescook@chromium.org> | |
Cc: | Russell King <linux@arm.linux.org.uk>, Will Deacon <will.deacon@arm.com>, Will Drewry <wad@chromium.org>, Geremy Condra <gcondra@google.com>, Al Viro <viro@zeniv.linux.org.uk>, Catalin Marinas <catalin.marinas@arm.com> | |
Archive‑link: | Article |
This adds support for seccomp BPF to ARM. When built with the seccomp improvement patch waiting in linux-next ("seccomp: Make syscall skipping and nr changes more consistent"), this passes the seccomp regression test suite: https://github.com/redpig/seccomp Thanks, -Kees --- v3: - updates suggested by Russell King: - reduced scope of expansion - leveraged TIF_SYSCALL_WORK bit mask - fixed syscall==-1 short-circuit logic v2: - expanded ptrace_syscall_trace() into both callers and do secure_computing() hookup there, as requested by Al Viro. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/