ACK: [SRU Bionic/linux-raspi2 0/1] Set CONFIG_SECURITY_PERF_EVENTS_RESTRICT

Kelsey Skunberg kelsey.skunberg at canonical.com
Fri Nov 27 19:07:14 UTC 2020


On 2020-11-26 17:52:05 , Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> perf_event_open is not restricted by default, which means unprivileged users
> may have access to information they should not have.
> 
> [Test case]
> Run as an unprivileged user:
> perf stat true
> and check that it fails.
> 
> [Potential regression]
> Users who expect to be able to use perf will not be able to do it. The fix
> might also cause the build to fail, in case it doesn't match enforced config
> options.
> 
> Thadeu Lima de Souza Cascardo (1):
>   UBUNTU: [Config]: set CONFIG_SECURITY_PERF_EVENTS_RESTRICT
> 
>  debian.raspi2/config/config.common.ubuntu | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 


Acked-by: Kelsey Skunberg <kelsey.skunberg at canonical.com>



> -- 
> 2.27.0
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list