Here's how you fix your below problem..
Make reading /proc/ against the permissions a capibility.. and make a
setcap bin for the user..
OR
Make a mount option to proc that prevents normal users from hiding their
processes.. :)
On Sat, 11 Jul 1998, Chris Evans wrote:
>
> On Sat, 11 Jul 1998, Laszlo Vecsey wrote:
>
> > Does anyone have a proc pid perm patch that applies cleanly to 2.1.108?
> > LinuxHQ has a small patch that works for 2.0.x but no longer applies
> > cleanly to the latest kernels.
>
> Linux 2.1 has somewhat "unplanned" proc pid perm support.
>
> Hold open a file descriptor to /proc/<pid> directory of your choice.
>
> Now, twiddle with the permissions all you like, and they persist.
>
> There are potential security issues here if admins, sensibly doing as
> little as root as possible, check for unwanted user processes from a
> normal user account.
>
> Cheers
> Chris
>
>
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.rutgers.edu
> Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html
>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html