From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755876Ab2DDCaR (ORCPT ); Tue, 3 Apr 2012 22:30:17 -0400 Received: from 50-56-35-84.static.cloud-ips.com ([50.56.35.84]:47723 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755447Ab2DDCaQ (ORCPT ); Tue, 3 Apr 2012 22:30:16 -0400 Date: Wed, 4 Apr 2012 02:30:33 +0000 From: "Serge E. Hallyn" To: Kees Cook Cc: Phillip Lougher , linux-kernel@vger.kernel.org, Andrew Morton , Richard Weinberger , Dan Rosenberg , "Serge E. Hallyn" , Eugene Teo , Eric Paris , James Morris Subject: Re: [PATCH] sysctl: fix restrict write access to dmesg_restrict Message-ID: <20120404023033.GB18730@mail.hallyn.com> References: <20120330234317.GC411@lenovo-rd230-04.lab.bos.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Kees Cook (keescook@chromium.org): > Actually, proc_dmesg_restrict is just a CAP_SYSADMIN-checking wrapper > around proc_dointvec_minmax. Probably both dmesg_restrict and > kptr_restrict should use it. I've seen no more emails since this one. Kees, do you want to send a new patch? (or has someone handled it?) thanks, -serge