-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The idea is, if you turn this boolean off, no domains will be allowed to sys_ptrace or ptrace. In doing this, I have noticed that the simplest ps -eZ command generates an access violation. allow sysadm_t self:capability sys_ptrace; # ps PID TTY TIME CMD 2123 pts/1 00:00:00 sudo 2127 pts/1 00:00:05 sh 4095 pts/1 00:00:00 ps sh-4.2# aud #============= sysadm_t ============== allow sysadm_t self:capability sys_ptrace; To me this looks like we are being too strict on the sys_ptrace cabability checking, which I believe is a bug in the kernel. If I go into /proc/PID directory of domain with a different UID, I get the following, permission denieds: cat: auxv: Permission denied cat: cwd: Permission denied cat: environ: Permission denied cat: exe: Permission denied cat: io: Permission denied cat: maps: Permission denied cat: numa_maps: Permission denied cat: pagemap: Permission denied cat: root: Permission denied cat: smaps: Permission denied cat: cwd: Permission denied Are all these really needed? Is knowing a processes current working directory the same as executing gdb -p PID ??? -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk6MfcoACgkQrlYvE4MpobNHggCfQ0grVjr4ewpfSS8v09rBjHCO 2REAnjSbZtLgyHuSixIa3+FlSlQ8nnoz =K+QE -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.