Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756943Ab2KHU74 (ORCPT ); Thu, 8 Nov 2012 15:59:56 -0500 Received: from smtp.outflux.net ([198.145.64.163]:46172 "EHLO smtp.outflux.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756640Ab2KHU7y (ORCPT ); Thu, 8 Nov 2012 15:59:54 -0500 From: Kees Cook To: linux-kernel@vger.kernel.org Cc: Russell King , Will Deacon , Geremy Condra , Catalin Marinas , Al Viro , Kees Cook , Will Drewry Subject: [PATCH v4 0/4] arch/arm: support seccomp Date: Thu, 8 Nov 2012 12:59:29 -0800 Message-Id: <1352408373-25047-1-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 1.7.9.5 X-HELO: www.outflux.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 864 Lines: 28 This adds support for seccomp BPF to ARM. When built with the seccomp improvement patch waiting in linux-next ("seccomp: Make syscall skipping and nr changes more consistent"), this passes the seccomp regression test suite: https://github.com/redpig/seccomp Thanks, -Kees --- v4: - fixed syscall_get_arch, thanks to Will Deacon. v3: - updates suggested by Russell King: - reduced scope of expansion - leveraged TIF_SYSCALL_WORK bit mask - fixed syscall==-1 short-circuit logic v2: - expanded ptrace_syscall_trace() into both callers and do secure_computing() hookup there, as requested by Al Viro. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/