arm64: add seccomp support
authorAKASHI Takahiro <takahiro.akashi@linaro.org>
Thu, 4 Sep 2014 15:01:08 +0000 (16:01 +0100)
committerJP Abgrall <jpa@google.com>
Tue, 7 Oct 2014 22:37:32 +0000 (15:37 -0700)
commit210957c2bb3b4d111963bb296e2c42beb8721929
treea9945b21b0adab0664d4829dfe8d53be0ccff418
parent9499cd23f9d05ba159fac6d55dc35a7f49f9ce76
arm64: add seccomp support

Note: This patch is from v6 of Takahiro's proposed
"arm64: add seccomp support" patchset (leecam@google.com)

secure_computing() is called first in syscall_trace_enter() so that a system
call will be aborted quickly without doing succeeding syscall tracing,
contrary to other cases, if seccomp rules deny that system call.

On compat task, syscall numbers for system calls allowed in seccomp mode 1
are different from those on normal tasks, and so _NR_seccomp_xxx_32's need
to be redefined.

Signed-off-by: AKASHI Takahiro <takahiro.akashi <at> linaro.org>
Conflicts:
arch/arm64/Kconfig
arch/arm64/kernel/entry.S

Change-Id: I5ec44507d7e536df7ec9d62d30a418c26ef15100
arch/arm64/Kconfig
arch/arm64/include/asm/ptrace.h
arch/arm64/include/asm/seccomp.h [new file with mode: 0644]
arch/arm64/include/asm/unistd.h
arch/arm64/kernel/entry.S
arch/arm64/kernel/ptrace.c