Candidate replacement approach for seccomp_filter (no ftrace)

Andy Whitcroft apw at canonical.com
Fri Jan 27 16:50:55 UTC 2012


On Fri, Jan 27, 2012 at 10:35:23AM -0600, Will Drewry wrote:

> Looking at the oops, it appears to be in ftrace filter creation.  It's
> possible that ftrace changes its internals in the middle of that
> kernel roll and create_preds is walking off into space.  I can take a
> look, if needed - let me know.

So are the old and new patch sets semantically equivalent to the seccomp
consumer?  At the time we took the previous patch set I seem to remember
it was to enable seccomp use by the chromium-browser.  Is that going to
work with the new patch set?

-apw




More information about the kernel-team mailing list