On Thu, Jul 17, 2003 at 01:01:11PM -0400, Robert Watson wrote: +> Most system functionality that relied on procfs has been rewritten to rely +> on other mechanisms. In general, I advise against running procfs--it's +> interesting, but conceptually it's very risky. If you look at the history +> of security advisories on systems that supported procfs (FreeBSD, Linux, +> Solaris), you'll get a sense of why: procfs represents processes as files, +> and the semantics of processes and of files are very different. For +> example, with processes, there are notions of revoked access; processes +> are reused to hold several programs often running with different +> credentials. +> +> The behavior I'm aware of that currently relies on procfs and has not yet +> been adapted to use ptrace() or sysctl() are: +> +> ps -e Relies on groping around in the address space of each +> process to display environmental variables.
I've prepare patch for this: http://garage.freebsd.pl/patches/ps-e.patch +> truss Relies on the event model of procfs; there have been some +> initial patches and discussion of migrating truss to ptrace() but +> I don't think we have anything very usable yet. I'd be happy to +> be corrected on this. :-) Hmm, why to change this behaviour? Is there any functionality that ktrace(1) doesn't provide? IMHO made ugly hacks just to made truss(1) (for years procfs-dependent) working without procfs is a bad idea. It could only display some friendly message that procfs isn't mounted instead of: truss: cannot open /proc/25217/mem: No such file or directory truss: cannot open /proc/curproc/mem: No such file or directory -- Pawel Jakub Dawidek [EMAIL PROTECTED] UNIX Systems Programmer/Administrator http://garage.freebsd.pl Am I Evil? Yes, I Am! http://cerber.sourceforge.net
pgp00000.pgp
Description: PGP signature