flo: update prebuilt kernel

ba88cbd flo_defconfig: Enable CONFIG_SECCOMP.
e8c64bc seccomp: Use atomic operations that are present in kernel 3.4.
6756f10 seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
8c2c32a introduce for_each_thread() to replace the buggy while_each_thread()
63d9416 seccomp: allow mode setting across threads
52cc75e seccomp: introduce writer locking
dbfe5a4 seccomp: split filter prep from check and apply
0901f9a sched: move no_new_privs into new atomic flags
61d45b4 ARM: add seccomp syscall
18540f2 seccomp: add "seccomp" syscall
40f7177 seccomp: split mode setting routines
d7a9b42 seccomp: extract check/assign mode helpers
00bd3c7 seccomp: create internal mode-setting function
e038ce5 MAINTAINERS: create seccomp entry
5ec08ba CHROMIUM: ARM: r1->r0 for get/set arguments
db3d307 CHROMIUM: seccomp: set -ENOSYS if there is no tracer
56e16b2 CHROMIUM: ARM: arch/arm: allow a scno of -1 to not cause a SIGILL
49a863e CHROMIUM: arch/arm: select HAVE_ARCH_SECCOMP_FILTER
339b867 CHROMIUM: arch/arm: move secure_computing into trace; respect return code
2b93913 CHROMIUM: arch/arm: add asm/syscall.h
05acc0b samples/seccomp: fix dependencies on arch macros
4444d9b seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTER
01bc71e seccomp: ignore secure_computing return values
60d3a9c seccomp: use a static inline for a function stub
bc3f6ef Documentation: prctl/seccomp_filter
b91885c Change-Id: I7c9d49079d4e18390c2d520513a4afd55e6eaa3e
2d338c7 ptrace,seccomp: Add PTRACE_SECCOMP support
f0a1e62 seccomp: Add SECCOMP_RET_TRAP
abdbfff signal, x86: add SIGSYS info and make it synchronous.
c548af9 seccomp: add SECCOMP_RET_ERRNO
929e7b9 seccomp: remove duplicated failure logging
cab80eb seccomp: add system call filtering using BPF
b88dfd9 arch/x86: add syscall_get_arch to syscall.h
00be32c asm/syscall.h: add syscall_get_arch
9742b8d seccomp: kill the seccomp_t typedef
06b878f net/compat.c,linux/filter.h: share compat_sock_fprog
5171cc5 sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
7f86aad Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS
14434ee Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs

b/15986335 Add seccomp-bpf to Android kernels
Signed-off-by: Iliyan Malchev <malchev@google.com>

Change-Id: I54da5ecce139c2f30d77092ed023d941a6d7f355
1 file changed
tree: fa2815a3edeba1719c8aa3f90906bb592d6449bf
  1. kernel