From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com Sender: Vasiliy Kulikov Date: Fri, 1 Jul 2011 15:35:33 +0400 From: Vasiliy Kulikov Message-ID: <20110701113533.GA19945@albatros> References: <20110622152514.GA9521@albatros> <20110629151436.9be479fb.akpm@linux-foundation.org> <20110701112534.GG20990@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20110701112534.GG20990@elte.hu> Subject: [kernel-hardening] Re: [RFC] ipc: introduce shm_rmid_forced sysctl To: Ingo Molnar , solar@openwall.com Cc: Andrew Morton , kernel-hardening@lists.openwall.com, Randy Dunlap , "Eric W. Biederman" , "Serge E. Hallyn" , Daniel Lezcano , Oleg Nesterov , Tejun Heo , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org List-ID: On Fri, Jul 01, 2011 at 13:25 +0200, Ingo Molnar wrote: > Furthermore, if testing shows that this is not actually breaking > anything in a serious way we could also in theory simplify the patch > and just make this the default behavior with no runtime ability to > switch it off. I'm afraid it's impossible. From -ow readme: "Of course, this breaks the way things are defined, so some applications might stop working. In particular, expect most commercial databases to break. Apache and PostgreSQL are known to work, though. :-)" http://www.openwall.com/linux/README.shtml But as it was written in days of Linux 2.4.x, the situation could have changed. A desktop system seems to work. Thanks, -- Vasiliy Kulikov http://www.openwall.com - bringing security into open computing environments