systemd/sysctl.d
Zbigniew Jędrzejewski-Szmek 6635f57d3e sysctl: enable coredump for suid binaries
Right now the kernel will not dump anything that went through setuid or
setgid. But it is routine for daemons to do that, and it makes things hard to
debug.

systemd-coredump saves the coredump readable by the users the process was
running as. This should be enough to avoid information leakage. So let's also
tell the kernel to do the coredump.

For https://bugzilla.redhat.com/show_bug.cgi?id=1790972.

Both patterns are stored in the same file, so they are enabled or disabled
together. (Though suid_dumpable=2 is supposed to be safe even when writing to
plain files.)
2020-04-07 15:28:46 +02:00
..
50-coredump.conf.in sysctl: enable coredump for suid binaries 2020-04-07 15:28:46 +02:00
50-default.conf sysctl: set ipv4 settings in a race-free way 2020-02-04 00:01:50 +01:00
50-pid-max.conf sysctl: bump pid range only on 64-bit systems 2019-05-20 18:13:59 +02:00
meson.build sysctl: bump pid range only on 64-bit systems 2019-05-20 18:13:59 +02:00