diff options
author | gVisor bot <gvisor-bot@google.com> | 2019-10-01 22:46:57 +0000 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2019-10-01 22:46:57 +0000 |
commit | 4738b69c4e3747ec48f4ea75d3fc5a758ae73df8 (patch) | |
tree | e9a8358efb076a2bf63757a119534d80b36c8753 /pkg/sentry/kernel | |
parent | 196caf150c7fd7333ab4cea5f6fb7c2971f25539 (diff) | |
parent | 0d483985c57a2d001039d17bd198e2eca0f4ff7f (diff) |
Merge release-20190806.1-225-g0d48398 (automated)
Diffstat (limited to 'pkg/sentry/kernel')
-rw-r--r-- | pkg/sentry/kernel/task_identity.go | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkg/sentry/kernel/task_identity.go b/pkg/sentry/kernel/task_identity.go index 78ff14b20..ce3e6ef28 100644 --- a/pkg/sentry/kernel/task_identity.go +++ b/pkg/sentry/kernel/task_identity.go @@ -465,8 +465,8 @@ func (t *Task) SetKeepCaps(k bool) { // disables the features we don't support anyway, is always set. This // drastically simplifies this function. // -// - We don't implement AT_SECURE, because no_new_privs always being set means -// that the conditions that require AT_SECURE never arise. (Compare Linux's +// - We don't set AT_SECURE = 1, because no_new_privs always being set means +// that the conditions that require AT_SECURE = 1 never arise. (Compare Linux's // security/commoncap.c:cap_bprm_set_creds() and cap_bprm_secureexec().) // // - We don't check for CAP_SYS_ADMIN in prctl(PR_SET_SECCOMP), since |