kernel_optimize_test/security
Tetsuo Handa aa40f5e33c tomoyo: recognize kernel threads correctly
commit 9c83465f3245c2faa82ffeb7016f40f02bfaa0ad upstream.

Commit db68ce10c4 ("new helper: uaccess_kernel()") replaced
segment_eq(get_fs(), KERNEL_DS) with uaccess_kernel(). But the correct
method for tomoyo to check whether current is a kernel thread in order
to assume that kernel threads are privileged for socket operations was
(current->flags & PF_KTHREAD). Now that uaccess_kernel() became 0 on x86,
tomoyo has to fix this problem. Do like commit 942cb357ae7d9249 ("Smack:
Handle io_uring kernel thread privileges") does.

Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2021-03-09 11:11:15 +01:00
..
apparmor
bpf
integrity certs: Fix blacklist flag type confusion 2021-03-04 11:37:59 +01:00
keys KEYS: trusted: Reserve TPM for seal and unseal operations 2021-03-04 11:38:29 +01:00
loadpin
lockdown
safesetid
selinux selinux: fix inconsistency between inode_getxattr and inode_listsecurity 2021-03-04 11:38:28 +01:00
smack smackfs: restrict bytes count in smackfs write functions 2021-03-07 12:34:05 +01:00
tomoyo tomoyo: recognize kernel threads correctly 2021-03-09 11:11:15 +01:00
yama task_work: cleanup notification modes 2020-10-17 15:05:30 -06:00
commoncap.c capabilities: Don't allow writing ambiguous v3 file capabilities 2021-03-04 11:37:52 +01:00
device_cgroup.c
inode.c
Kconfig
Kconfig.hardening
lsm_audit.c dump_common_audit_data(): fix racy accesses to ->d_name 2021-01-19 18:27:29 +01:00
Makefile
min_addr.c
security.c