lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 30 Oct 2020 16:34:03 +0100 From: Jann Horn <jannh@...gle.com> To: Mickaël Salaün <mic@...ikod.net> Cc: Christian Brauner <christian.brauner@...ntu.com>, Kees Cook <keescook@...omium.org>, Oleg Nesterov <oleg@...hat.com>, Eric Paris <eparis@...hat.com>, James Morris <jmorris@...ei.org>, "Serge E . Hallyn" <serge@...lyn.com>, Tyler Hicks <tyhicks@...ux.microsoft.com>, Will Drewry <wad@...omium.org>, kernel list <linux-kernel@...r.kernel.org>, stable <stable@...r.kernel.org>, Mickaël Salaün <mic@...ux.microsoft.com> Subject: Re: [PATCH v1 2/2] seccomp: Set PF_SUPERPRIV when checking capability On Fri, Oct 30, 2020 at 1:39 PM Mickaël Salaün <mic@...ikod.net> wrote: > Replace the use of security_capable(current_cred(), ...) with > ns_capable_noaudit() which set PF_SUPERPRIV. > > Since commit 98f368e9e263 ("kernel: Add noaudit variant of > ns_capable()"), a new ns_capable_noaudit() helper is available. Let's > use it! > > Cc: Jann Horn <jannh@...gle.com> > Cc: Kees Cook <keescook@...omium.org> > Cc: Tyler Hicks <tyhicks@...ux.microsoft.com> > Cc: Will Drewry <wad@...omium.org> > Cc: stable@...r.kernel.org > Fixes: e2cfabdfd075 ("seccomp: add system call filtering using BPF") > Signed-off-by: Mickaël Salaün <mic@...ux.microsoft.com> Reviewed-by: Jann Horn <jannh@...gle.com>
Powered by blists - more mailing lists