Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753107AbZL3SAs (ORCPT ); Wed, 30 Dec 2009 13:00:48 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752576AbZL3SAr (ORCPT ); Wed, 30 Dec 2009 13:00:47 -0500 Received: from e9.ny.us.ibm.com ([32.97.182.139]:36922 "EHLO e9.ny.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752274AbZL3SAq (ORCPT ); Wed, 30 Dec 2009 13:00:46 -0500 Date: Wed, 30 Dec 2009 12:00:45 -0600 From: "Serge E. Hallyn" To: "Eric W. Biederman" Cc: Alan Cox , Benny Amorsen , Bryan Donlan , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?iso-8859-1?Q?Am=E9rico?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Subject: Re: RFC: disablenetwork facility. (v4) Message-ID: <20091230180045.GA14493@us.ibm.com> References: <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> <20091229223631.GB22578@us.ibm.com> <20091230035008.GA6819@us.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1101 Lines: 33 Quoting Eric W. Biederman (ebiederm@xmission.com): > "Serge E. Hallyn" writes: > > >> In common cap we drop the new capabilities if we are being ptraced. > >> Look for brm->unsafe. > > > > Yes - that isn't the issue. > > Right. Sorry. I saw that we set unsafe and totally > missed that we don't act on it in that case. > > > It goes back to finding a way to figure out what is inside the > > file when the installer obviously thought we shouldn't be able > > to read the file. > > > > Do we care? > > > > I expect two lines of testing bprm->unsafe and failing > at the right point would solve that. But what is the right response? Prevent excecution? Stop the tracer? Enter some one-shot mode where the whole exec appears as one step, but tracing continues if execution continues on a dumpable file? -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/