summaryrefslogtreecommitdiff
path: root/include/linux/seccomp.h
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2020-07-22 23:59:55 +0200
committerThomas Gleixner <tglx@linutronix.de>2020-07-24 14:59:03 +0200
commit6823ecabf03031d610a6c5afe7ed4b4fd659a99f (patch)
treeccd7b47841db80e13bf25fe12b6d61ed12d81053 /include/linux/seccomp.h
parentba47d845d715a010f7b51f6f89bae32845e6acb7 (diff)
seccomp: Provide stub for __secure_computing()
To avoid #ifdeffery in the upcoming generic syscall entry work code provide a stub for __secure_computing() as this is preferred over secure_computing() because the TIF flag is already evaluated. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Acked-by: Kees Cook <keescook@chromium.org> Link: https://lkml.kernel.org/r/20200722220519.404974280@linutronix.de
Diffstat (limited to 'include/linux/seccomp.h')
-rw-r--r--include/linux/seccomp.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/seccomp.h b/include/linux/seccomp.h
index 4192369b8418..03d28c32ad01 100644
--- a/include/linux/seccomp.h
+++ b/include/linux/seccomp.h
@@ -61,6 +61,7 @@ struct seccomp_filter { };
#ifdef CONFIG_HAVE_ARCH_SECCOMP_FILTER
static inline int secure_computing(void) { return 0; }
+static inline int __secure_computing(void) { return 0; }
#else
static inline void secure_computing_strict(int this_syscall) { return; }
#endif