Re: [PATCH v2] socket.7: Document some BPF-related socket options

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 ❦  1 mars 2016 21:26 +0100, "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx> :

>> The typical use case is still about privileges since a fully privileged
>> process could just create a similar socket without the filter. It makes
>> little sense to create a socket, add a filter and lock it if you keep
>> your privileges.
>
> Thanks. That, plus a reread of the commit message was the info I needed.
> The point here is that we're talking about raw sockets, right? I 
> reworded that paragraph to:
>
>               The typical use case is for a privileged process to  set
>               up   a  raw  socket  (an  operation  that  requires  the
>               CAP_NET_RAW capability), apply a restrictive filter, set
>               the  SO_LOCK_FILTER  option,  and  then  either drop its
>               privileges or pass the  socket  file  descriptor  to  an
>               unprivileged process via a UNIX domain socket.

Perfect for me.
-- 
The better part of valor is discretion.
		-- William Shakespeare, "Henry IV"
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Kernel Documentation]     [Netdev]     [Linux Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux