diff options
| author | Alexey Dobriyan <adobriyan@gmail.com> | 2006-08-27 04:23:28 -0400 |
|---|---|---|
| committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-08-27 14:01:28 -0400 |
| commit | a2e0b56316fa90e137802fdad6a7c6a9b85c86c3 (patch) | |
| tree | b9ea6534c1e1e1dd6a0e24bdadebc9e4be147590 | |
| parent | cc36e7f124da139a819ad316c39d9dbcb5ba1897 (diff) | |
[PATCH] Fix docs for fs.suid_dumpable
Sergey Vlasov noticed that there is not kernel.suid_dumpable, but
fs.suid_dumpable.
How KERN_SETUID_DUMPABLE ended up in fs_table[]? Hell knows...
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
| -rw-r--r-- | Documentation/sysctl/fs.txt | 20 | ||||
| -rw-r--r-- | Documentation/sysctl/kernel.txt | 20 |
2 files changed, 20 insertions, 20 deletions
diff --git a/Documentation/sysctl/fs.txt b/Documentation/sysctl/fs.txt index 0b62c62142cf..5c3a51905969 100644 --- a/Documentation/sysctl/fs.txt +++ b/Documentation/sysctl/fs.txt | |||
| @@ -25,6 +25,7 @@ Currently, these files are in /proc/sys/fs: | |||
| 25 | - inode-state | 25 | - inode-state |
| 26 | - overflowuid | 26 | - overflowuid |
| 27 | - overflowgid | 27 | - overflowgid |
| 28 | - suid_dumpable | ||
| 28 | - super-max | 29 | - super-max |
| 29 | - super-nr | 30 | - super-nr |
| 30 | 31 | ||
| @@ -131,6 +132,25 @@ The default is 65534. | |||
| 131 | 132 | ||
| 132 | ============================================================== | 133 | ============================================================== |
| 133 | 134 | ||
| 135 | suid_dumpable: | ||
| 136 | |||
| 137 | This value can be used to query and set the core dump mode for setuid | ||
| 138 | or otherwise protected/tainted binaries. The modes are | ||
| 139 | |||
| 140 | 0 - (default) - traditional behaviour. Any process which has changed | ||
| 141 | privilege levels or is execute only will not be dumped | ||
| 142 | 1 - (debug) - all processes dump core when possible. The core dump is | ||
| 143 | owned by the current user and no security is applied. This is | ||
| 144 | intended for system debugging situations only. Ptrace is unchecked. | ||
| 145 | 2 - (suidsafe) - any binary which normally would not be dumped is dumped | ||
| 146 | readable by root only. This allows the end user to remove | ||
| 147 | such a dump but not access it directly. For security reasons | ||
| 148 | core dumps in this mode will not overwrite one another or | ||
| 149 | other files. This mode is appropriate when adminstrators are | ||
| 150 | attempting to debug problems in a normal environment. | ||
| 151 | |||
| 152 | ============================================================== | ||
| 153 | |||
| 134 | super-max & super-nr: | 154 | super-max & super-nr: |
| 135 | 155 | ||
| 136 | These numbers control the maximum number of superblocks, and | 156 | These numbers control the maximum number of superblocks, and |
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 7345c338080a..89bf8c20a586 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt | |||
| @@ -50,7 +50,6 @@ show up in /proc/sys/kernel: | |||
| 50 | - shmmax [ sysv ipc ] | 50 | - shmmax [ sysv ipc ] |
| 51 | - shmmni | 51 | - shmmni |
| 52 | - stop-a [ SPARC only ] | 52 | - stop-a [ SPARC only ] |
| 53 | - suid_dumpable | ||
| 54 | - sysrq ==> Documentation/sysrq.txt | 53 | - sysrq ==> Documentation/sysrq.txt |
| 55 | - tainted | 54 | - tainted |
| 56 | - threads-max | 55 | - threads-max |
| @@ -310,25 +309,6 @@ kernel. This value defaults to SHMMAX. | |||
| 310 | 309 | ||
| 311 | ============================================================== | 310 | ============================================================== |
| 312 | 311 | ||
| 313 | suid_dumpable: | ||
| 314 | |||
| 315 | This value can be used to query and set the core dump mode for setuid | ||
| 316 | or otherwise protected/tainted binaries. The modes are | ||
| 317 | |||
| 318 | 0 - (default) - traditional behaviour. Any process which has changed | ||
| 319 | privilege levels or is execute only will not be dumped | ||
| 320 | 1 - (debug) - all processes dump core when possible. The core dump is | ||
| 321 | owned by the current user and no security is applied. This is | ||
| 322 | intended for system debugging situations only. Ptrace is unchecked. | ||
| 323 | 2 - (suidsafe) - any binary which normally would not be dumped is dumped | ||
| 324 | readable by root only. This allows the end user to remove | ||
| 325 | such a dump but not access it directly. For security reasons | ||
| 326 | core dumps in this mode will not overwrite one another or | ||
| 327 | other files. This mode is appropriate when adminstrators are | ||
| 328 | attempting to debug problems in a normal environment. | ||
| 329 | |||
| 330 | ============================================================== | ||
| 331 | |||
| 332 | tainted: | 312 | tainted: |
| 333 | 313 | ||
| 334 | Non-zero if the kernel has been tainted. Numeric values, which | 314 | Non-zero if the kernel has been tainted. Numeric values, which |
