On Tue, Mar 15, 2005 at 03:44:28PM +0100, Ingo Molnar wrote:
> let me put it another way: this is a security hole. seccomp is now a way
> to evade the auditing of read/write syscalls done to an opened file. 
> Please fix this.

This is not true, the auditing of read/write will work fine on the
seccomp task too. I guess you overlooked something in the code.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to