Re: [RESEND][PATCH] Let even non-dumpable tasks access /proc/self/fd
From: Eric W. Biederman
Date: Tue Jun 20 2006 - 02:23:58 EST
Andrew Morton <akpm@xxxxxxxx> writes:
> On Fri, 16 Jun 2006 14:41:57 +0200
> Petr Baudis <pasky@xxxxxxx> wrote:
>
>> All tasks calling setuid() from root to non-root during their lifetime
>> will not be able to access their /proc/self/fd. This is troublesome
>> because the fstatat() and other *at() routines are emulated by accessing
>> /proc/self/fd/*/path and that will break with setuid()ing programs,
>> leading to various weird consequences (e.g. with the latest glibc,
>> nftw() does not work with setuid()ing programs on ppc and furthermore
>> causes the LSB testsuite to fail because of this).
>
> Odd. Did something actually change in glibc to make this start happening?
>
>> This kernel patch fixes the problem by letting the process access its
>> own /proc/self/fd - as far as I can see, this should be reasonably safe
>> since for the process, this does not reveal "anything new". Feel free to
>> comment on this.
>>
>
> Eric, Chris - any thought on this one?
This can't fix the glibc emulation problem. As the kernel
this patch would apply to doesn't need emulation.
The basic goal of allowing the current process to access it's
own proc directories is reasonable.
I don't like the implementation. It is not obvious that this case
applies just to the current process.
I admit that any permission checking in /proc that happens at
open time instead of at access time is buggy but that is
the best we have right now.
Anything more requires a very close review.
Eric
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/