diff options
| author | Eric W. Biederman <[email protected]> | 2017-01-23 04:26:31 +0000 |
|---|---|---|
| committer | Eric W. Biederman <[email protected]> | 2017-01-23 23:03:08 +0000 |
| commit | 9227dd2a84a765fcfef1677ff17de0958b192eda (patch) | |
| tree | 8dc953fa3145922b6db30c8ebf9f34ff018bde5b /security/selinux/hooks.c | |
| parent | exec: Test the ptracer's saved cred to see if the tracee can gain caps (diff) | |
| download | kernel-9227dd2a84a765fcfef1677ff17de0958b192eda.tar.gz kernel-9227dd2a84a765fcfef1677ff17de0958b192eda.zip | |
exec: Remove LSM_UNSAFE_PTRACE_CAP
With previous changes every location that tests for
LSM_UNSAFE_PTRACE_CAP also tests for LSM_UNSAFE_PTRACE making the
LSM_UNSAFE_PTRACE_CAP redundant, so remove it.
Signed-off-by: "Eric W. Biederman" <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
| -rw-r--r-- | security/selinux/hooks.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index c7c6619431d5..cece6fe55f02 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -2404,8 +2404,7 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm) /* Make sure that anyone attempting to ptrace over a task that * changes its SID has the appropriate permit */ - if (bprm->unsafe & - (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { + if (bprm->unsafe & LSM_UNSAFE_PTRACE) { u32 ptsid = ptrace_parent_sid(current); if (ptsid != 0) { rc = avc_has_perm(ptsid, new_tsec->sid, |
