Move the default dump location to /var/spool/abrt from /var/tmp/abrt and Use root for owner of all dump directories Fixes for CVE-2015-3315, CVE-2015-3142, CVE-2015-1869, CVE-2015-1870 Fixes for CVE-2015-3147, CVE-2015-3151, CVE-2015-3150, CVE-2015-3159 Resolves: #1179752 Signed-off-by: Matej Habrnal <mhabrnal@redhat.com>
60 lines
2.2 KiB
Diff
60 lines
2.2 KiB
Diff
From 5484c326298f5cfab97553154398e805059a1756 Mon Sep 17 00:00:00 2001
|
|
From: Jakub Filak <jfilak@redhat.com>
|
|
Date: Tue, 5 May 2015 10:46:06 +0200
|
|
Subject: [PATCH] lib: add new kernel taint flags
|
|
|
|
Signed-off-by: Jakub Filak <jfilak@redhat.com>
|
|
---
|
|
src/lib/kernel.c | 16 +++++++++++-----
|
|
1 file changed, 11 insertions(+), 5 deletions(-)
|
|
|
|
diff --git a/src/lib/kernel.c b/src/lib/kernel.c
|
|
index be80cbc..75c56e0 100644
|
|
--- a/src/lib/kernel.c
|
|
+++ b/src/lib/kernel.c
|
|
@@ -608,8 +608,14 @@ char *koops_extract_version(const char *linepointer)
|
|
* 'W' - Taint on warning.
|
|
* 'C' - modules from drivers/staging are loaded.
|
|
* 'I' - Working around severe firmware bug.
|
|
+ * 'O' - Out-of-tree module has been loaded.
|
|
+ * 'E' - Unsigned module has been loaded.
|
|
+ * 'L' - A soft lockup has previously occurred.
|
|
+ * 'K' - Kernel has been live patched.
|
|
+ *
|
|
+ * Compatibility flags from older versions and downstream sources:
|
|
* 'H' - Hardware is unsupported.
|
|
- * T - Tech_preview
|
|
+ * 'T' - Tech_preview
|
|
*/
|
|
|
|
#if 0 /* unused */
|
|
@@ -634,7 +640,7 @@ char *kernel_tainted_short(const char *kernel_bt)
|
|
return NULL;
|
|
|
|
tainted += strlen("Tainted: ");
|
|
- /* 13 == current count of known flags */
|
|
+ /* 17 + 2 == current count of known flags */
|
|
/* http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=blob_plain;f=kernel/panic.c;hb=HEAD */
|
|
/* 26 the maximal sane count of flags because of alphabet limits */
|
|
unsigned sz = 26 + 1;
|
|
@@ -677,14 +683,14 @@ static const char *const tnts_long[] = {
|
|
/* B */ "System has hit bad_page.",
|
|
/* C */ "Modules from drivers/staging are loaded.",
|
|
/* D */ "Kernel has oopsed before",
|
|
- /* E */ NULL,
|
|
+ /* E */ "Unsigned module has been loaded."
|
|
/* F */ "Module has been forcibly loaded.",
|
|
/* G */ "Proprietary module has not been loaded.",
|
|
/* H */ NULL,
|
|
/* I */ "Working around severe firmware bug.",
|
|
/* J */ NULL,
|
|
- /* K */ NULL,
|
|
- /* L */ NULL,
|
|
+ /* K */ "Kernel has been live patched.",
|
|
+ /* L */ "A soft lockup has previously occurred.",
|
|
/* M */ "System experienced a machine check exception.",
|
|
/* N */ NULL,
|
|
/* O */ "Out-of-tree module has been loaded.",
|
|
--
|
|
2.1.0
|
|
|