From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com Message-ID: <4DEAD959.5060509@gmail.com> Date: Sun, 05 Jun 2011 09:18:17 +0800 From: Pavel Labushev MIME-Version: 1.0 References: <20110518150601.GA2921@albatros> <20110524023409.GC12486@openwall.com> <20110524151246.GA3401@albatros> <4DE139FE.8050808@gmail.com> <20110604181911.GC5034@openwall.com> <20110604202018.GA8019@shinshilla> <4DEAC96B.1010107@gmail.com> In-Reply-To: <4DEAC96B.1010107@gmail.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: Re: [kernel-hardening] /proc/PID directory hiding To: kernel-hardening@lists.openwall.com List-ID: >>> Is the above on grsecurity? >> >> No, grsecurity hides uid/gid from both *stat*(2) and getdents*(2) functions >> (implemented as proc_pid_readdir() and pid_getattr()). > > Yes, it's on grsecurity. Just try it and see. > > $ uname -r > 2.6.39-grsec > $ find /proc -maxdepth 1 -type d -name 1 > $ ls -ld /proc/1 > dr-xr-x--- 6 root root 0 Jun 4 21:05 /proc/1 Fixed in the latest grsec patches.