Message ID | 20200721110808.348199175@linutronix.de (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | entry, x86, kvm: Generic entry/exit functionality for host and guest | expand |
On Tue, Jul 21, 2020 at 12:57:07PM +0200, Thomas Gleixner wrote: > To avoid #ifdeffery in the upcoming generic syscall entry work code provide > a stub for __secure_computing() as this is preferred over > secure_computing() because the TIF flag is already evaluated. > > Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Acked-by: Kees Cook <keescook@chromium.org>
--- a/include/linux/seccomp.h +++ b/include/linux/seccomp.h @@ -61,6 +61,7 @@ struct seccomp_filter { }; #ifdef CONFIG_HAVE_ARCH_SECCOMP_FILTER static inline int secure_computing(void) { return 0; } +static inline int __secure_computing(void) { return 0; } #else static inline void secure_computing_strict(int this_syscall) { return; } #endif
To avoid #ifdeffery in the upcoming generic syscall entry work code provide a stub for __secure_computing() as this is preferred over secure_computing() because the TIF flag is already evaluated. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> --- V4: New patch --- include/linux/seccomp.h | 1 + 1 file changed, 1 insertion(+)