|
|
Subscribe / Log in / New account

arch/arm: support seccomp

From:  Kees Cook <keescook@chromium.org>
To:  linux-kernel@vger.kernel.org
Subject:  [PATCH v3 0/4] arch/arm: support seccomp
Date:  Thu, 1 Nov 2012 17:14:56 -0700
Message-ID:  <1351815300-28627-1-git-send-email-keescook@chromium.org>
Cc:  Russell King <linux@arm.linux.org.uk>, Will Deacon <will.deacon@arm.com>, Will Drewry <wad@chromium.org>, Geremy Condra <gcondra@google.com>, Al Viro <viro@zeniv.linux.org.uk>, Catalin Marinas <catalin.marinas@arm.com>
Archive‑link:  Article

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees

---
v3:
 - updates suggested by Russell King:
   - reduced scope of expansion
   - leveraged TIF_SYSCALL_WORK bit mask
   - fixed syscall==-1 short-circuit logic
   
v2:
 - expanded ptrace_syscall_trace() into both callers and do
   secure_computing() hookup there, as requested by Al Viro.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Copyright © 2012, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds