On 23May2012 19:37, JD <jd1008@xxxxxxxxx> wrote: | So what there are entries there that are root owned, | and some of them have root only access perms: | -r-------- 1 root root 0 May 23 11:48 auxv | --w------- 1 root root 0 May 23 11:48 clear_refs | -r-------- 1 root root 0 May 23 11:48 environ | dr-x------ 2 root root 0 May 23 11:20 fd/ | dr-x------ 2 root root 0 May 23 11:48 fdinfo/ | -r-------- 1 root root 0 May 23 11:48 io | -rw------- 1 root root 0 May 23 11:48 mem | -r-------- 1 root root 0 May 23 11:48 mountstats Ok. | My question is : how were they opened by a process | that has no root perms in the first place? | The process' running program has no suid perm: | -rwxr-xr-x 1 root root 1013268 Jan 18 03:28 /usr/bin/gnome-keyring-daemon | | So, if these resources are accessible to this process, | how did this process, which has no root privs, | gain access to these resources which are accessible only | to root user? I'm missing something here. When did this process access this stuff in proc? Importantly, _via_ /proc? The /proc/<pid> stuff happens after the fact. If I open a file and get fd 3 for it, there will be a /proc/<pid>/fd/3; but its not what I used to access the file. As Ed remarks, /proc itself may not be paying much attention to the visible permissions. Maybe a process can open its own /proc/<pid>/foo stuff regardless; I don't know. -- Cameron Simpson <cs@xxxxxxxxxx> DoD#743 http://www.cskk.ezoshosting.com/cs/ Do not taunt Happy Fun Coder. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org