lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210607221943.78414-1-dann.frazier@canonical.com>
Date:   Mon,  7 Jun 2021 16:19:43 -0600
From:   dann frazier <dann.frazier@...onical.com>
To:     linux-man@...r.kernel.org,
        "Alejandro Colomar (man-pages)" <alx.manpages@...il.com>,
        Michael Kerrisk <mtk.manpages@...il.com>,
        David Howells <dhowells@...hat.com>,
        Heinrich Schuchardt <xypron.glpk@....de>
Cc:     linux-kernel@...r.kernel.org,
        Pedro Principeza <pedro.principeza@...onical.com>
Subject: [PATCH] kernel_lockdown.7: Remove additional text alluding to lifting via SysRq

My previous patch intended to drop the docs for the lockdown lift SysRq,
but it missed this other section that refers to lifting it via a keyboard -
an allusion to that same SysRq.

Signed-off-by: dann frazier <dann.frazier@...onical.com>
---
 man7/kernel_lockdown.7 | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/man7/kernel_lockdown.7 b/man7/kernel_lockdown.7
index b0442b3b6..0c0a9500d 100644
--- a/man7/kernel_lockdown.7
+++ b/man7/kernel_lockdown.7
@@ -19,9 +19,6 @@ modification of the kernel image and to prevent access to security and
 cryptographic data located in kernel memory, whilst still permitting driver
 modules to be loaded.
 .PP
-Lockdown is typically enabled during boot and may be terminated, if configured,
-by typing a special key combination on a directly attached physical keyboard.
-.PP
 If a prohibited or restricted feature is accessed or used, the kernel will emit
 a message that looks like:
 .PP
-- 
2.32.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ