diff options
| author | Ondrej Mosnacek <omosnace@redhat.com> | 2026-02-16 16:06:24 +0100 |
|---|---|---|
| committer | Jan Kara <jack@suse.cz> | 2026-02-26 15:18:31 +0100 |
| commit | 0d5ee3373426395478c355f3e93ba4b1118a04e9 (patch) | |
| tree | 755061fd20e276dee77431e97ed3efb74935167c /samples/workqueue/stall_detector/git@git.tavy.me:linux.git | |
| parent | 6a320935fa4293e9e599ec9f85dc9eb3be7029f8 (diff) | |
fanotify: avoid/silence premature LSM capability checks
Make sure calling capable()/ns_capable() actually leads to access denied
when false is returned, because these functions emit an audit record
when a Linux Security Module denies the capability, which makes it
difficult to avoid allowing/silencing unnecessary permissions in
security policies (namely with SELinux).
Where the return value just used to set a flag, use the non-auditing
ns_capable_noaudit() instead.
Fixes: 7cea2a3c505e ("fanotify: support limited functionality for unprivileged users")
Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com>
Reviewed-by: Paul Moore <paul@paul-moore.com>
Reviewed-by: Amir Goldstein <amir73il@gmail.com>
Link: https://patch.msgid.link/20260216150625.793013-2-omosnace@redhat.com
Signed-off-by: Jan Kara <jack@suse.cz>
Diffstat (limited to 'samples/workqueue/stall_detector/git@git.tavy.me:linux.git')
0 files changed, 0 insertions, 0 deletions
