android_kernel_oneplus_msm8998/tools/testing/selftests/seccomp
Kees Cook c463c0f037 seccomp: Add filter flag to opt-out of SSB mitigation
commit 00a02d0c502a06d15e07b857f8ff921e3e402675 upstream

If a seccomp user is not interested in Speculative Store Bypass mitigation
by default, it can set the new SECCOMP_FILTER_FLAG_SPEC_ALLOW flag when
adding filters.

Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
Reviewed-by: Matt Helsley (VMware) <matt.helsley@gmail.com>
Reviewed-by: Alexey Makhalov <amakhalov@vmware.com>
Reviewed-by: Bo Gan <ganb@vmware.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-07-25 10:18:27 +02:00
..
.gitignore selftests: add seccomp suite 2015-06-17 17:12:32 -06:00
Makefile selftests: add seccomp suite 2015-06-17 17:12:32 -06:00
seccomp_bpf.c seccomp: Add filter flag to opt-out of SSB mitigation 2018-07-25 10:18:27 +02:00
test_harness.h selftests/seccomp: add support for s390 2015-09-14 16:41:37 -06:00