From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932333AbVHIFxw (ORCPT ); Tue, 9 Aug 2005 01:53:52 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932407AbVHIFxw (ORCPT ); Tue, 9 Aug 2005 01:53:52 -0400 Received: from mail26.sea5.speakeasy.net ([69.17.117.28]:11713 "EHLO mail26.sea5.speakeasy.net") by vger.kernel.org with ESMTP id S932333AbVHIFxv (ORCPT ); Tue, 9 Aug 2005 01:53:51 -0400 Date: Tue, 9 Aug 2005 01:53:49 -0400 (EDT) From: James Morris X-X-Sender: jmorris@excalibur.intercode To: David Madore cc: Linux Kernel mailing-list Subject: Re: understanding Linux capabilities brokenness In-Reply-To: <20050809045916.GA3157@clipper.ens.fr> Message-ID: References: <20050808211241.GA22446@clipper.ens.fr> <20050808223238.GA523@clipper.ens.fr> <20050809015048.GA14204@thunk.org> <20050809045916.GA3157@clipper.ens.fr> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 9 Aug 2005, David Madore wrote: > the "process management" part. For example, I might like to run this > or that binary, which claims it needs to be run as root, with a > limited set of capabilities: the current Linux kernels make this quite > impossible. Not impossible with SELinux. - James -- James Morris