On Sun, Apr 22, 2007 at 01:50:45AM -0700, Andrew Morton wrote: > On Sun, 22 Apr 2007 10:39:41 +0200 Bastian Blank <[email protected]> wrote: > > > The commit 34f5a39899f3f3e815da64f48ddb72942d86c366 restricted reading > > of the tainted value. The attached patch changes this back to a > > write-only check and restores the read behaviour of older versions. > > > > Signed-off-by: Bastian Blank <[email protected]> > > there's no patch here. Ups. diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 1b255df..c904748 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -1676,7 +1676,7 @@ static int proc_dointvec_taint(ctl_table *table, int write, struct file *filp, { int op; - if (!capable(CAP_SYS_ADMIN)) + if (write && !capable(CAP_SYS_ADMIN)) return -EPERM; op = OP_OR; -- Captain's Log, star date 21:34.5...
Attachment:
signature.asc
Description: Digital signature
- References:
- [PATCH] Allow reading tainted flag as user
- From: Bastian Blank <[email protected]>
- Re: [PATCH] Allow reading tainted flag as user
- From: Andrew Morton <[email protected]>
- [PATCH] Allow reading tainted flag as user
- Prev by Date: [BUG? -rc7] SMP: Just one CPU activated: P4 3GHz HT
- Next by Date: Re: [PATCH 08/10] mm: count writeback pages per BDI
- Previous by thread: Re: [PATCH] Allow reading tainted flag as user
- Next by thread: [PATCH -stable] KVM: MMU: Fix guest writes to nonpae pde
- Index(es):