diff options
author | Sebastian Schmidt <yath@yath.de> | 2014-10-19 20:05:15 +0200 |
---|---|---|
committer | Tony Luck <tony.luck@intel.com> | 2014-11-05 09:59:48 -0800 |
commit | 68c4a4f8abc60c9440ede9cd123d48b78325f7a3 (patch) | |
tree | ef8aefb7d8c3769204116ff65cfa48551464a275 /include/linux/eisa.h | |
parent | a28726b4fb624f81d637a8afb9ea12fc16500f61 (diff) |
pstore: Honor dmesg_restrict sysctl on dmesg dumps
When the kernel.dmesg_restrict restriction is in place, only users with
CAP_SYSLOG should be able to access crash dumps (like: attacker is
trying to exploit a bug, watchdog reboots, attacker can happily read
crash dumps and logs).
This puts the restriction on console-* types as well as sensitive
information could have been leaked there.
Other log types are unaffected.
Signed-off-by: Sebastian Schmidt <yath@yath.de>
Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Tony Luck <tony.luck@intel.com>
Diffstat (limited to 'include/linux/eisa.h')
0 files changed, 0 insertions, 0 deletions