Hello,
please consider backporting commit 08ef1af4de5f ("perf/core: Fix unconditional security_locked_down() call") to stable kernels, as without it SELinux requires an extraneous permission for perf_event_open(2) calls with PERF_SAMPLE_REGS_INTR unset.
The range of target kernel versions is implied by the Fixes: tag.
Thanks,
On Wed, May 05, 2021 at 12:58:24PM +0200, Ondrej Mosnacek wrote:
Hello,
please consider backporting commit 08ef1af4de5f ("perf/core: Fix unconditional security_locked_down() call") to stable kernels, as without it SELinux requires an extraneous permission for perf_event_open(2) calls with PERF_SAMPLE_REGS_INTR unset.
The range of target kernel versions is implied by the Fixes: tag.
Now queued up, thanks.
greg k-h
On Wed, May 5, 2021 at 1:07 PM Greg KH gregkh@linuxfoundation.org wrote:
On Wed, May 05, 2021 at 12:58:24PM +0200, Ondrej Mosnacek wrote:
Hello,
please consider backporting commit 08ef1af4de5f ("perf/core: Fix unconditional security_locked_down() call") to stable kernels, as without it SELinux requires an extraneous permission for perf_event_open(2) calls with PERF_SAMPLE_REGS_INTR unset.
The range of target kernel versions is implied by the Fixes: tag.
Now queued up, thanks.
greg k-h
Wow, that was fast :) Thanks, Greg!
-- Ondrej Mosnacek Software Engineer, Linux Security - SELinux kernel Red Hat, Inc.
linux-stable-mirror@lists.linaro.org