blob: 90fedd738f12469205a5ae205218d01b5be9b87b [file] [log] [blame]
From 05bf73447a33202cc10eda2a58b9e10a2684f1ae Mon Sep 17 00:00:00 2001
From: Sonny Rao <sonnyrao@chromium.org>
Date: Fri, 5 Apr 2013 17:54:16 -0700
Subject: [PATCH] CHROMIUM: security: enable VFS link restrictions by default
This enables the protected symlink and hardlink sysctls by default.
Change-Id: I7725cb4e4342022e469b22a7156ba6754b571a96
Signed-off-by: Sonny Rao <sonnyrao@chromium.org>
[rebase419(groeck): Context conflicts]
Signed-off-by: Guenter Roeck <groeck@chromium.org>
Change-Id: If83e594f67647b87c5034ed311ed3900f5060f14
---
fs/namei.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/fs/namei.c b/fs/namei.c
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -1020,8 +1020,8 @@ static inline void put_link(struct nameidata *nd)
path_put(&last->link);
}
-static int sysctl_protected_symlinks __read_mostly;
-static int sysctl_protected_hardlinks __read_mostly;
+static int sysctl_protected_symlinks __read_mostly = 1;
+static int sysctl_protected_hardlinks __read_mostly = 1;
static int sysctl_protected_fifos __read_mostly;
static int sysctl_protected_regular __read_mostly;
--
2.35.0.rc0.227.g00780c9af4-goog