sched: move no_new_privs into new atomic flags
[deliverable/linux.git] / kernel / seccomp.c
index f0652578af759b8f8a5e2c7dbcb79d22561f0fba..d2596136b0d1729ce49a116e428f28e5939cb8eb 100644 (file)
@@ -241,7 +241,7 @@ static long seccomp_attach_filter(struct sock_fprog *fprog)
         * This avoids scenarios where unprivileged tasks can affect the
         * behavior of privileged children.
         */
-       if (!current->no_new_privs &&
+       if (!task_no_new_privs(current) &&
            security_capable_noaudit(current_cred(), current_user_ns(),
                                     CAP_SYS_ADMIN) != 0)
                return -EACCES;
This page took 0.027712 seconds and 5 git commands to generate.