On Mon, 10 Sep 2018, Schaufler, Casey wrote: > Why are you dropping the LSM check here, when in v4 you fixed the > SELinux audit locking issue? We can avoid introducing an LSM hook > and all the baggage around it if you can do the security_ptrace_access_check() > here.
So what guarantees that none of the hooks that security_ptrace_access_check() is invoking will not be taking locks (from scheduler context in this case)? Thanks, -- Jiri Kosina SUSE Labs

