pstore: Honor dmesg_restrict sysctl on dmesg dumps
authorSebastian Schmidt <yath@yath.de>
Sun, 19 Oct 2014 18:05:15 +0000 (20:05 +0200)
committerTony Luck <tony.luck@intel.com>
Wed, 5 Nov 2014 17:59:48 +0000 (09:59 -0800)
commit68c4a4f8abc60c9440ede9cd123d48b78325f7a3
treeef8aefb7d8c3769204116ff65cfa48551464a275
parenta28726b4fb624f81d637a8afb9ea12fc16500f61
pstore: Honor dmesg_restrict sysctl on dmesg dumps

When the kernel.dmesg_restrict restriction is in place, only users with
CAP_SYSLOG should be able to access crash dumps (like: attacker is
trying to exploit a bug, watchdog reboots, attacker can happily read
crash dumps and logs).

This puts the restriction on console-* types as well as sensitive
information could have been leaked there.

Other log types are unaffected.

Signed-off-by: Sebastian Schmidt <yath@yath.de>
Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Tony Luck <tony.luck@intel.com>
fs/pstore/inode.c
include/linux/syslog.h
kernel/printk/printk.c