kernel_optimize_test/arch/x86/um/asm
Linus Torvalds ab074ade9c Merge git://git.infradead.org/users/eparis/audit
Pull audit updates from Eric Paris:
 "So this change across a whole bunch of arches really solves one basic
  problem.  We want to audit when seccomp is killing a process.  seccomp
  hooks in before the audit syscall entry code.  audit_syscall_entry
  took as an argument the arch of the given syscall.  Since the arch is
  part of what makes a syscall number meaningful it's an important part
  of the record, but it isn't available when seccomp shoots the
  syscall...

  For most arch's we have a better way to get the arch (syscall_get_arch)
  So the solution was two fold: Implement syscall_get_arch() everywhere
  there is audit which didn't have it.  Use syscall_get_arch() in the
  seccomp audit code.  Having syscall_get_arch() everywhere meant it was
  a useless flag on the stack and we could get rid of it for the typical
  syscall entry.

  The other changes inside the audit system aren't grand, fixed some
  records that had invalid spaces.  Better locking around the task comm
  field.  Removing some dead functions and structs.  Make some things
  static.  Really minor stuff"

* git://git.infradead.org/users/eparis/audit: (31 commits)
  audit: rename audit_log_remove_rule to disambiguate for trees
  audit: cull redundancy in audit_rule_change
  audit: WARN if audit_rule_change called illegally
  audit: put rule existence check in canonical order
  next: openrisc: Fix build
  audit: get comm using lock to avoid race in string printing
  audit: remove open_arg() function that is never used
  audit: correct AUDIT_GET_FEATURE return message type
  audit: set nlmsg_len for multicast messages.
  audit: use union for audit_field values since they are mutually exclusive
  audit: invalid op= values for rules
  audit: use atomic_t to simplify audit_serial()
  kernel/audit.c: use ARRAY_SIZE instead of sizeof/sizeof[0]
  audit: reduce scope of audit_log_fcaps
  audit: reduce scope of audit_net_id
  audit: arm64: Remove the audit arch argument to audit_syscall_entry
  arm64: audit: Add audit hook in syscall_trace_enter/exit()
  audit: x86: drop arch from __audit_syscall_entry() interface
  sparc: implement is_32bit_task
  sparc: properly conditionalize use of TIF_32BIT
  ...
2014-10-19 16:25:56 -07:00
..
apic.h um: asm/apic.h is there only to shadow the x86 one... 2011-11-02 14:15:22 +01:00
arch_hweight.h
archparam.h
barrier.h x86: Remove CONFIG_X86_OOSTORE 2014-03-11 10:16:18 -07:00
checksum_32.h um/x86: merge 32 and 64bit variants of checksum.h 2012-10-09 22:28:16 +02:00
checksum_64.h um/x86: merge 32 and 64bit variants of checksum.h 2012-10-09 22:28:16 +02:00
checksum.h um/x86: merge 32 and 64bit variants of checksum.h 2012-10-09 22:28:16 +02:00
desc.h
elf.h arm64,ia64,ppc,s390,sh,tile,um,x86,mm: remove default gate area 2014-08-08 15:57:27 -07:00
irq_vectors.h um: irq_vectors.h just shadows x86 one 2011-11-02 14:15:24 +01:00
mm_context.h um: take ldt.h to arch/x86/um/asm/mm_context.h 2011-11-02 14:15:21 +01:00
module.h
processor_32.h um: Rewrite show_stack() 2013-11-17 11:27:25 +01:00
processor_64.h um: Rewrite show_stack() 2013-11-17 11:27:25 +01:00
processor.h arch, locking: Ciao arch_mutex_cpu_relax() 2014-07-17 12:32:47 +02:00
ptrace.h ARCH: AUDIT: audit_syscall_entry() should not require the arch 2014-09-23 16:21:26 -04:00
required-features.h um: required-features.h is there only to shadow x86 one... 2011-11-02 14:15:23 +01:00
segment.h um: segment.h is x86-only and needed only there 2011-11-02 14:15:33 +01:00
syscall.h UM: implement syscall_get_arch() 2014-09-23 16:20:02 -04:00
vm-flags.h