Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757642AbZFYIJi (ORCPT ); Thu, 25 Jun 2009 04:09:38 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753120AbZFYIJW (ORCPT ); Thu, 25 Jun 2009 04:09:22 -0400 Received: from earthlight.etchedpixels.co.uk ([81.2.110.250]:56144 "EHLO www.etchedpixels.co.uk" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751622AbZFYIJV (ORCPT ); Thu, 25 Jun 2009 04:09:21 -0400 Date: Thu, 25 Jun 2009 09:10:02 +0100 From: Alan Cox To: Denys Vlasenko Cc: Linux Kernel Mailing List , Andrew Morton , Mike Frysinger Subject: Re: [PATCH] allow execve'ing "/proc/self/exe" even if /proc is not mounted Message-ID: <20090625091002.0b8203a7@lxorguk.ukuu.org.uk> In-Reply-To: <1158166a0906241600w5f7f4ffcm49d9c849f0c27f72@mail.gmail.com> References: <1158166a0906241600w5f7f4ffcm49d9c849f0c27f72@mail.gmail.com> X-Mailer: Claws Mail 3.7.0 (GTK+ 2.14.7; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 689 Lines: 18 > With this patch, it is possible to execute /proc/self/exe > even if /proc is not mounted. In the below example, > ./sh is a static shell binary: What if the user has procfs mounted somewherelse, what if they are in a chroot where you don't want them to patch the binary and re-exec it ? It would be far far cleaner for NOMMU to have a NOMMU private "reexec()" call that didn't rely on procfs or hacking names into the kernel. So NAK Alan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/