This has been bugging me the whole time I read through that code.
Enough so to send a patch for this trivial thing.

Signed-off-by: Christian Brauner <christian.brau...@ubuntu.com>
---
 kernel/ptrace.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel/ptrace.c b/kernel/ptrace.c
index 84b1367935e4..374a0d4fd022 100644
--- a/kernel/ptrace.c
+++ b/kernel/ptrace.c
@@ -326,7 +326,7 @@ static int __ptrace_may_access(struct task_struct *task, 
unsigned int mode)
        if (mm &&
            ((get_dumpable(mm) != SUID_DUMP_USER) &&
             !ptrace_has_cap(mm->user_ns, mode)))
-           return -EPERM;
+               return -EPERM;
 
        return security_ptrace_access_check(task, mode);
 }
-- 
2.14.1

Reply via email to