jk> Yes, but /if/ KTRACE is present, today's code allows you to bypass
jk>the lack of read permissions on an executable.  That shouldn't be
jk>allowed.  The current behaviour could be regarded as a security
jk>hole actually :).

sef> No more so than core dumps do.

Yes, but an application can protect itself from an inadvertent core dump.
It can't (today) against being ktrace'd.

sef> I vote strongly against this change.

Noted, thanks.

I will summarize the result of the discussion in a followup to kern/3546.

Regards,
Koshy




To Unsubscribe: send mail to majord...@freebsd.org
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to