Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263051AbTHaXCM (ORCPT ); Sun, 31 Aug 2003 19:02:12 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263053AbTHaXCM (ORCPT ); Sun, 31 Aug 2003 19:02:12 -0400 Received: from fw.osdl.org ([65.172.181.6]:8387 "EHLO mail.osdl.org") by vger.kernel.org with ESMTP id S263051AbTHaXCH (ORCPT ); Sun, 31 Aug 2003 19:02:07 -0400 Date: Sun, 31 Aug 2003 16:01:16 -0700 (PDT) From: Linus Torvalds To: "Zach, Yoav" cc: akpm@osdl.org, Subject: Re: [PATCH]: non-readable binaries - binfmt_misc 2.6.0-test4 In-Reply-To: <2C83850C013A2540861D03054B478C0601CF64C8@hasmsx403.iil.intel.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 801 Lines: 21 On Mon, 1 Sep 2003, Zach, Yoav wrote: > > The proposed patch solves a problem for interpreters that need to > execute a non-readable file, which cannot be read in userland. To handle > such cases the interpreter must have the kernel load the binary on its > behalf. I don't like the security issues here. Sure, you "trust" the interpreter, and clearly only root can set the flag, but to me that just makes me wonder why the interpreter itself can't be a simple suid wrapper that does the mapping rather than having it done in kernel space.. Linus - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/