lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 30 Dec 2008 16:19:42 -0800 (PST) From: Roland McGrath <roland@...hat.com> To: Sukadev Bhattiprolu <sukadev@...ux.vnet.ibm.com> Cc: oleg@...hat.com, ebiederm@...ssion.com, bastian@...di.eu.org, daniel@...ac.com, xemul@...nvz.org, containers@...ts.osdl.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH 4/6][v5] Protect cinit from unblocked SIG_DFL signals Since you didn't add the sig_task_unkillable() helper for its one simple condition in patch 2/6, I don't think you need it here either for two. Just add '&& !from_ancestor_ns' inline. This patch has more stray whitespace changes. I think checkpatch.pl will spot those for you. I'd just make the flag a parameter to send_signal() directly. Then you can just change kill_pid_info_as_uid (or its replacement) to call send_signal() with that new flag (and the 'group' flag) directly instead of using the trivial __group_send_sig_info wrapper. Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists