On Thu, Feb 16, 2017 at 10:24 PM, James Morris <jmor...@namei.org> wrote:
> On Thu, 16 Feb 2017, Stephen Smalley wrote:
>
>> When SELinux was first added to the kernel, a process could only get
>> and set its own resource limits via getrlimit(2) and setrlimit(2), so no
>> MAC checks were required for those operations, and thus no security hooks
>> were defined for them. Later, SELinux introduced a hook for setlimit(2)
>> with a check if the hard limit was being changed in order to be able to
>> rely on the hard limit value as a safe reset point upon context
>> transitions.
>
> [...]
>
>
> Queued for 4.11 at
> git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git#next-queue

Stephen pushed a v2 patch to fix a build problem, are you going to
fixup your tree?

-- 
paul moore
www.paul-moore.com
_______________________________________________
Selinux mailing list
Selinux@tycho.nsa.gov
To unsubscribe, send email to selinux-le...@tycho.nsa.gov.
To get help, send an email containing "help" to selinux-requ...@tycho.nsa.gov.

Reply via email to