home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!spool.mu.edu!uwm.edu!ux1.cso.uiuc.edu!moe.ksu.ksu.edu!kitty.ksu.ksu.edu!news
- From: probreak@kitty.ksu.ksu.edu (James Michael Chacon)
- Newsgroups: comp.os.linux
- Subject: Re: ps and /dev/kmem
- Date: 18 Dec 1992 23:46:05 -0600
- Organization: Kansas State University
- Lines: 22
- Message-ID: <1gucutINNb87@kitty.ksu.ksu.edu>
- References: <1992Dec18.063831.24368@news.stolaf.edu> <20234@ksr.com>
- NNTP-Posting-Host: kitty.ksu.ksu.edu
-
- zdenek@ksr.com (Zdenek Radouch) writes:
- >If you want a really BAD example of what happens when one hacks /dev/kmem
- >look no further than GNUmake. GNUmake needs access to the machine loading info,
- >and it was designed to retrieve it from /dev/kmem rather than using a generic
- >module that would retrieve it from wherever it can. This resulted in a design
- >where GNUmake must run with euid=0 (at least at times that it accesses kmem),
- >and toggle uid back whenever it touches real files. This is unfortunately
- >impossible to do with a single executable (you need two, one suid) under POSIX
- >or Sys V, so GNUmake will not work on these machines. The bad part is that
- >since the whole /dev/kmem concept was so tightly built in, there is no way
- >to fix this easily, a fix would require a major redesign and consequently
- >they (FSF) won't even address this issue.
-
- >my $.02
- >-Z
-
- What system do you run GNUmake on? It only has to run setgid kmem on most to
- access /dev/kmem. I guess you could look at the code where it changes gids
- and set up some races to allow you access to /dev/kmem. But, I don't see any
- other problems with it.
-
- James
-