aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/seccomp.c
diff options
context:
space:
mode:
Diffstat (limited to 'kernel/seccomp.c')
-rw-r--r--kernel/seccomp.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/kernel/seccomp.c b/kernel/seccomp.c
index 580ac2d4024f..15a1795bbba1 100644
--- a/kernel/seccomp.c
+++ b/kernel/seccomp.c
@@ -316,24 +316,24 @@ static inline void seccomp_sync_threads(void)
316 put_seccomp_filter(thread); 316 put_seccomp_filter(thread);
317 smp_store_release(&thread->seccomp.filter, 317 smp_store_release(&thread->seccomp.filter,
318 caller->seccomp.filter); 318 caller->seccomp.filter);
319
320 /*
321 * Don't let an unprivileged task work around
322 * the no_new_privs restriction by creating
323 * a thread that sets it up, enters seccomp,
324 * then dies.
325 */
326 if (task_no_new_privs(caller))
327 task_set_no_new_privs(thread);
328
319 /* 329 /*
320 * Opt the other thread into seccomp if needed. 330 * Opt the other thread into seccomp if needed.
321 * As threads are considered to be trust-realm 331 * As threads are considered to be trust-realm
322 * equivalent (see ptrace_may_access), it is safe to 332 * equivalent (see ptrace_may_access), it is safe to
323 * allow one thread to transition the other. 333 * allow one thread to transition the other.
324 */ 334 */
325 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED) { 335 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED)
326 /*
327 * Don't let an unprivileged task work around
328 * the no_new_privs restriction by creating
329 * a thread that sets it up, enters seccomp,
330 * then dies.
331 */
332 if (task_no_new_privs(caller))
333 task_set_no_new_privs(thread);
334
335 seccomp_assign_mode(thread, SECCOMP_MODE_FILTER); 336 seccomp_assign_mode(thread, SECCOMP_MODE_FILTER);
336 }
337 } 337 }
338} 338}
339 339