Kees Cook 93e35efb8d x86/ptrace: run seccomp after ptrace
This moves seccomp after ptrace on x86 to that seccomp can catch changes
made by ptrace. Emulation should skip the rest of processing too.

We can get rid of test_thread_flag because there's no longer any
opportunity for seccomp to mess with ptrace state before invoking
ptrace.

Suggested-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: x86@kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
2016-06-14 10:54:41 -07:00
..
2016-05-27 15:57:31 -07:00
2016-05-24 10:22:34 -07:00
2016-04-20 10:36:57 +02:00
2016-04-20 10:36:57 +02:00
2016-05-24 10:22:34 -07:00
2016-04-22 10:29:07 +02:00