[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110919205541.1c44f1a3@bob.linux.org.uk>
Date: Mon, 19 Sep 2011 20:55:41 +0100
From: Alan Cox <alan@...ux.intel.com>
To: Valdis.Kletnieks@...edu
Cc: Vasiliy Kulikov <segoon@...nwall.com>,
Pekka Enberg <penberg@...helsinki.fi>,
Andrew Morton <akpm@...ux-foundation.org>,
kernel-hardening@...ts.openwall.com, Kees Cook <kees@...ntu.com>,
Cyrill Gorcunov <gorcunov@...il.com>,
Al Viro <viro@...iv.linux.org.uk>,
Christoph Lameter <cl@...ux-foundation.org>,
Matt Mackall <mpm@...enic.com>, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, Dan Rosenberg <drosenberg@...curity.com>,
Theodore Tso <tytso@....edu>, Jesper Juhl <jj@...osbits.net>,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [kernel-hardening] Re: [RFC PATCH 2/2] mm: restrict access to
/proc/slabinfo
On Mon, 19 Sep 2011 15:45:07 -0400
Valdis.Kletnieks@...edu wrote:
> On Mon, 19 Sep 2011 18:46:58 +0400, Vasiliy Kulikov said:
>
> > One note: only to _kernel_ developers. It means it is a strictly
> > debugging feature, which shouldn't be enabled in the production
> > systems.
>
> Until somebody at vendor support says "What does 'cat /proc/slabinfo'
> say?"
>
> Anybody who thinks that debugging tools should be totally disabled on
> "production" systems probably hasn't spent enough time actually
> running production systems.
Agreed - far better it is simply set root only. At that point if you
can read it you've bypassed DAC anyway so either you already control
the box or something like SELinux or SMACK is in the way in which case
*it* can manage extra policy just fine.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists