By Will Drewry (22) and others
via Grant Grundler
* chromeos-security-3.4: (31 commits)
CHROMIUM: ARM: r1->r0 for get/set arguments
CHROMIUM: seccomp: set -ENOSYS if there is no tracer
CHROMIUM: ARM: arch/arm: allow a scno of -1 to not cause a SIGILL
CHROMIUM: arch/arm: select HAVE_ARCH_SECCOMP_FILTER
CHROMIUM: arch/arm: move secure_computing into trace; respect return code
CHROMIUM: arch/arm: add asm/syscall.h
BACKPORT: samples/seccomp: fix dependencies on arch macros
BACKPORT: seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTER
BACKPORT: seccomp: ignore secure_computing return values
BACKPORT: seccomp: use a static inline for a function stub
BACKPORT: Documentation: prctl/seccomp_filter
BACKPORT: x86: Enable HAVE_ARCH_SECCOMP_FILTER
BACKPORT: ptrace,seccomp: Add PTRACE_SECCOMP support
BACKPORT: seccomp: Add SECCOMP_RET_TRAP
BACKPORT: signal, x86: add SIGSYS info and make it synchronous.
BACKPORT: seccomp: add SECCOMP_RET_ERRNO
BACKPORT: seccomp: remove duplicated failure logging
BACKPORT: seccomp: add system call filtering using BPF
BACKPORT: arch/x86: add syscall_get_arch to syscall.h
BACKPORT: asm/syscall.h: add syscall_get_arch
...