Hi, This series fix the recent seccomp update for the User-mode Linux architecture (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6 (close the hole where ptrace can change a syscall out from under seccomp).
Regards, Mickaël Salaün (3): um/ptrace: Fix the syscall_trace_leave call um/ptrace: Fix the syscall number update after a ptrace seccomp: Remove 2-phase API documentation arch/Kconfig | 11 ----------- arch/um/kernel/skas/syscall.c | 10 +++------- arch/x86/um/ptrace_32.c | 3 +++ arch/x86/um/ptrace_64.c | 4 ++++ 4 files changed, 10 insertions(+), 18 deletions(-) -- 2.8.1