[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LRH.2.21.1812311511360.1435@namei.org>
Date: Mon, 31 Dec 2018 15:15:08 +1100 (AEDT)
From: James Morris <jmorris@...ei.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
cc: linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org
Subject: [GIT PULL] security: seccomp changes for v4.21
>From Kees:
"- Add SECCOMP_RET_USER_NOTIF
- seccomp fixes for sparse warnings and s390 build (Tycho)"
The following changes since commit 1072bd678547f8663cfb81a22fdb50c589e4976e:
security: fs: make inode explicitly non-modular (2018-12-12 14:58:51 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-seccomp
for you to fetch changes up to 55b8cbe470d103b44104c64dbf89e5cad525d4e0:
Merge tag 'seccomp-next-part2' of https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux into next-seccomp (2018-12-17 11:36:26 -0800)
----------------------------------------------------------------
James Morris (2):
Merge tag 'seccomp-next' of https://git.kernel.org/.../kees/linux into next-seccomp
Merge tag 'seccomp-next-part2' of https://git.kernel.org/.../kees/linux into next-seccomp
Tycho Andersen (6):
seccomp: hoist struct seccomp_data recalculation higher
seccomp: switch system call argument type to void *
seccomp: add a return code to trap to userspace
samples: add an example of seccomp user trap
seccomp: fix poor type promotion
seccomp, s390: fix build for syscall type change
Documentation/ioctl/ioctl-number.txt | 1 +
Documentation/userspace-api/seccomp_filter.rst | 84 +++++
arch/s390/kernel/compat_wrapper.c | 2 +-
include/linux/seccomp.h | 9 +-
include/linux/syscalls.h | 2 +-
include/uapi/linux/seccomp.h | 40 ++-
kernel/seccomp.c | 467 ++++++++++++++++++++++++-
samples/seccomp/.gitignore | 1 +
samples/seccomp/Makefile | 7 +-
samples/seccomp/user-trap.c | 375 ++++++++++++++++++++
tools/testing/selftests/seccomp/seccomp_bpf.c | 447 ++++++++++++++++++++++-
11 files changed, 1411 insertions(+), 24 deletions(-)
create mode 100644 samples/seccomp/user-trap.c
Powered by blists - more mailing lists