Kees Cook ce6526e8af seccomp: recheck the syscall after RET_TRACE
When RET_TRACE triggers, a tracer may change a syscall into something that
should be filtered by seccomp. This re-runs seccomp after a trace event
to make sure things continue to pass.

Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Andy Lutomirski <luto@kernel.org>
2016-06-14 10:54:41 -07:00
..
2016-05-10 17:12:49 +02:00
2016-06-03 15:05:51 +02:00
2016-05-26 00:04:58 -04:00
2016-05-22 19:40:39 -07:00
2015-04-11 22:27:55 -04:00
2015-11-19 17:51:48 +01:00
2016-01-22 18:04:28 -05:00
2016-04-04 09:46:47 -04:00
2016-02-08 11:25:39 -05:00
2014-08-08 15:57:18 -07:00
2015-12-14 14:54:37 -05:00
2016-05-12 11:05:27 -04:00
2015-04-12 21:03:31 +02:00
2016-05-26 15:35:44 -07:00
2015-11-23 09:44:58 +01:00
2016-04-28 19:34:04 -07:00
2016-05-23 17:04:14 -07:00
2016-02-16 13:04:58 -05:00
2016-05-27 15:26:11 -07:00
2015-01-17 10:02:23 +13:00
2016-01-22 18:04:28 -05:00
2016-03-01 20:36:56 +01:00