aboutsummaryrefslogtreecommitdiffstats
path: root/arch/powerpc/lib/code-patching.c
diff options
context:
space:
mode:
authorEyal Birger <[email protected]>2025-02-02 16:29:21 +0000
committerKees Cook <[email protected]>2025-02-06 21:19:14 +0000
commitc2debdb8544f415eaf9292a866d4073912eeb561 (patch)
treef4b78b5fe7cf145fd1ff2357b65bd444f8520aac /arch/powerpc/lib/code-patching.c
parentseccomp: passthrough uretprobe systemcall without filtering (diff)
downloadkernel-c2debdb8544f415eaf9292a866d4073912eeb561.tar.gz
kernel-c2debdb8544f415eaf9292a866d4073912eeb561.zip
selftests/seccomp: validate uretprobe syscall passes through seccomp
The uretprobe syscall is implemented as a performance enhancement on x86_64 by having the kernel inject a call to it on function exit; User programs cannot call this system call explicitly. As such, this syscall is considered a kernel implementation detail and should not be filtered by seccomp. Enhance the seccomp bpf test suite to check that uretprobes can be attached to processes without the killing the process regardless of seccomp policy. Signed-off-by: Eyal Birger <[email protected]> Link: https://lore.kernel.org/r/[email protected] [kees: Skip archs without __NR_uretprobe] Signed-off-by: Kees Cook <[email protected]>
Diffstat (limited to 'arch/powerpc/lib/code-patching.c')
0 files changed, 0 insertions, 0 deletions