From mboxrd@z Thu Jan 1 00:00:00 1970
Reply-To: kernel-hardening@lists.openwall.com
Message-ID: <4DEAC96B.1010107@gmail.com>
Date: Sun, 05 Jun 2011 08:10:19 +0800
From: Pavel Labushev
MIME-Version: 1.0
References: <20110518150601.GA2921@albatros> <20110524023409.GC12486@openwall.com> <20110524151246.GA3401@albatros> <4DE139FE.8050808@gmail.com> <20110604181911.GC5034@openwall.com> <20110604202018.GA8019@shinshilla>
In-Reply-To: <20110604202018.GA8019@shinshilla>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Subject: Re: [kernel-hardening] /proc/PID directory hiding
To: kernel-hardening@lists.openwall.com
List-ID:
05.06.2011 04:20, Vasiliy Kulikov пишет:
>> Is the above on grsecurity?
>
> No, grsecurity hides uid/gid from both *stat*(2) and getdents*(2) functions
> (implemented as proc_pid_readdir() and pid_getattr()).
Yes, it's on grsecurity. Just try it and see.
$ uname -r
2.6.39-grsec
$ find /proc -maxdepth 1 -type d -name 1
$ ls -ld /proc/1
dr-xr-x--- 6 root root 0 Jun 4 21:05 /proc/1