hammerhead: update prebuilt kernel

072e227 hammerhead_defconfig: Enable CONFIG_SECCOMP.
c36d439 seccomp: Use atomic operations that are present in kernel 3.4.
e1eabc7 seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
34cfd08 introduce for_each_thread() to replace the buggy while_each_thread()
e309405 seccomp: allow mode setting across threads
1a43e09 seccomp: introduce writer locking
9f92442 seccomp: split filter prep from check and apply
01c6fc6 sched: move no_new_privs into new atomic flags
5f78e86 ARM: add seccomp syscall
0105949 seccomp: add "seccomp" syscall
fc10277 seccomp: split mode setting routines
9023e94 seccomp: extract check/assign mode helpers
49e10e9 seccomp: create internal mode-setting function
a368047 MAINTAINERS: create seccomp entry
3ebaf36 CHROMIUM: ARM: r1->r0 for get/set arguments
d82255d CHROMIUM: seccomp: set -ENOSYS if there is no tracer
bb676e0 CHROMIUM: ARM: arch/arm: allow a scno of -1 to not cause a SIGILL
53e0661 CHROMIUM: arch/arm: select HAVE_ARCH_SECCOMP_FILTER
fbce8ae CHROMIUM: arch/arm: move secure_computing into trace; respect return code
5792cb8 CHROMIUM: arch/arm: add asm/syscall.h
43a7534 samples/seccomp: fix dependencies on arch macros
54bca3b seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTER
9ad6586 seccomp: ignore secure_computing return values
68eb5e1 seccomp: use a static inline for a function stub
25327e1 Documentation: prctl/seccomp_filter
ccf6118 Change-Id: I7c9d49079d4e18390c2d520513a4afd55e6eaa3e
facd997 ptrace,seccomp: Add PTRACE_SECCOMP support
f519f79 seccomp: Add SECCOMP_RET_TRAP
8601b08 signal, x86: add SIGSYS info and make it synchronous.
d563702 seccomp: add SECCOMP_RET_ERRNO
8ceaf58 seccomp: remove duplicated failure logging
5274ef3 seccomp: add system call filtering using BPF
0f07c39 arch/x86: add syscall_get_arch to syscall.h
08d00c9 asm/syscall.h: add syscall_get_arch
466e716 seccomp: kill the seccomp_t typedef
2708428 net/compat.c,linux/filter.h: share compat_sock_fprog
4efa79f sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
c0e919b Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS
04cd41c Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs

BUG: 15986335
Change-Id: If05c5e0841402709fbdb678be6e922dda04296f7
Signed-off-by: Mohamad Ayyash <mkayyash@google.com>
1 file changed
tree: f2bb749fb5de8b0f7f04f9f29aff7f1533649390
  1. zImage-dtb