commit | c385d0db30f3c0bf687a080c38e8088c342116a3 | [log] [tgz] |
---|---|---|
author | Michael Ellerman <mpe@ellerman.id.au> | Thu Jul 23 20:21:10 2015 +1000 |
committer | Michael Ellerman <mpe@ellerman.id.au> | Thu Jul 30 14:35:36 2015 +1000 |
tree | fe8feb020a909ce88ba418eb4328fd80b890dd59 | |
parent | 2449acc5348b94325e9374056b2cc3ed55816e96 [diff] |
selftests/seccomp: Make seccomp tests work on big endian The seccomp_bpf test uses BPF_LD|BPF_W|BPF_ABS to load 32-bit values from seccomp_data->args. On big endian machines this will load the high word of the argument, which is not what the test wants. Borrow a hack from samples/seccomp/bpf-helper.h which changes the offset on big endian to account for this. Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Acked-by: Kees Cook <keescook@chromium.org>