diff options
author | Rafal Krypa <r.krypa@samsung.com> | 2016-04-04 12:14:53 +0300 |
---|---|---|
committer | Casey Schaufler <casey@schaufler-ca.com> | 2016-06-08 23:52:31 +0300 |
commit | 18d872f77cecec2677a394170f26aaeb08562cee (patch) | |
tree | b9d58ab693ce181382a7c62a4d8a42676248a3fe /lib/test_printf.c | |
parent | 40d273782ff16fe1a7445cc05c66a447dfea3433 (diff) | |
download | linux-18d872f77cecec2677a394170f26aaeb08562cee.tar.xz |
Smack: ignore null signal in smack_task_kill
Kill with signal number 0 is commonly used for checking PID existence.
Smack treated such cases like any other kills, although no signal is
actually delivered when sig == 0.
Checking permissions when sig == 0 didn't prevent an unprivileged caller
from learning whether PID exists or not. When it existed, kernel returned
EPERM, when it didn't - ESRCH. The only effect of policy check in such
case is noise in audit logs.
This change lets Smack silently ignore kill() invocations with sig == 0.
Signed-off-by: Rafal Krypa <r.krypa@samsung.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'lib/test_printf.c')
0 files changed, 0 insertions, 0 deletions