From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com Message-ID: <4DEAC96B.1010107@gmail.com> Date: Sun, 05 Jun 2011 08:10:19 +0800 From: Pavel Labushev MIME-Version: 1.0 References: <20110518150601.GA2921@albatros> <20110524023409.GC12486@openwall.com> <20110524151246.GA3401@albatros> <4DE139FE.8050808@gmail.com> <20110604181911.GC5034@openwall.com> <20110604202018.GA8019@shinshilla> In-Reply-To: <20110604202018.GA8019@shinshilla> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Subject: Re: [kernel-hardening] /proc/PID directory hiding To: kernel-hardening@lists.openwall.com List-ID: 05.06.2011 04:20, Vasiliy Kulikov пишет: >> Is the above on grsecurity? > > No, grsecurity hides uid/gid from both *stat*(2) and getdents*(2) functions > (implemented as proc_pid_readdir() and pid_getattr()). Yes, it's on grsecurity. Just try it and see. $ uname -r 2.6.39-grsec $ find /proc -maxdepth 1 -type d -name 1 $ ls -ld /proc/1 dr-xr-x--- 6 root root 0 Jun 4 21:05 /proc/1