diff options
| author | Kees Cook <keescook@chromium.org> | 2016-06-09 12:36:50 -0700 |
|---|---|---|
| committer | Maggie White <maggiewhite@google.com> | 2019-02-28 01:37:05 +0000 |
| commit | 7734d5abc327e9ea93bb37d74e4f6161d109a739 (patch) | |
| tree | 365a51a34575759d830410a9c3fe1f3d8e523e73 /tools/perf/scripts/python/syscall-counts.py | |
| parent | 5ae321ce00df87f44cd5ea24003ab78a5c1d0eee (diff) | |
BACKPORT: x86/ptrace: run seccomp after ptrace
This moves seccomp after ptrace on x86 to that seccomp can catch changes
made by ptrace. Emulation should skip the rest of processing too.
We can get rid of test_thread_flag because there's no longer any
opportunity for seccomp to mess with ptrace state before invoking
ptrace.
Suggested-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: x86@kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
(cherry picked from commit 93e35efb8de45393cf61ed07f7b407629bf698ea)
Bug: 119769499
Change-Id: Ia8e6f9a314b8ab36abee47082e49c66fcf201433
[ghackmann@google.com: apply entry/common.c changes to kernel/ptrace.c]
Signed-off-by: Greg Hackmann <ghackmann@google.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions
