On Tue, Mar 15, 2005 at 03:44:28PM +0100, Ingo Molnar wrote: > let me put it another way: this is a security hole. seccomp is now a way > to evade the auditing of read/write syscalls done to an opened file. > Please fix this.
This is not true, the auditing of read/write will work fine on the seccomp task too. I guess you overlooked something in the code. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/