ACK: [SRU Bionic/linux-raspi2 0/1] Set CONFIG_SECURITY_PERF_EVENTS_RESTRICT
Kelsey Skunberg
kelsey.skunberg at canonical.com
Fri Nov 27 19:07:14 UTC 2020
On 2020-11-26 17:52:05 , Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> perf_event_open is not restricted by default, which means unprivileged users
> may have access to information they should not have.
>
> [Test case]
> Run as an unprivileged user:
> perf stat true
> and check that it fails.
>
> [Potential regression]
> Users who expect to be able to use perf will not be able to do it. The fix
> might also cause the build to fail, in case it doesn't match enforced config
> options.
>
> Thadeu Lima de Souza Cascardo (1):
> UBUNTU: [Config]: set CONFIG_SECURITY_PERF_EVENTS_RESTRICT
>
> debian.raspi2/config/config.common.ubuntu | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
Acked-by: Kelsey Skunberg <kelsey.skunberg at canonical.com>
> --
> 2.27.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list