Id like to ask about a possible new use for file and directory sticky bits,
or setuid bits, to address the root-only use of /proc (etc) files

this needs root

  echo module kvm +p > /proc/dynamic_debug/control

how about this ?

cat root-owned-readonly-file  > /proc/dynamic_debug/control

the root-owned-file can define a fixed set of dprintk enablements,
and since its ro, its contents are controlled.

is there some combination of special-bits on the source (ro root owned)
and destination (root owned)
that could safely allow joe-user to cat that file into control ?

If it could fit here, it might then be a general workaround to root-shell access
for /proc /sys manipulations

_______________________________________________
Kernelnewbies mailing list
[email protected]
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

Reply via email to