That would be a big security hole waiting to happen though. Nothing
forces the less trusted recipient not to send in zeroes or finish the
lines (for a text file) or respect a particular format (for a binary
file).
In practice, I tend to think that any secutiry scheme flink breaks is
brittle at best. It requires passing a fd to a file which is owned by
the same uid than the untrusted process, and rely somehow on the
directory structure to prevent direct access to said file. But the
trusted process must have had access to the file somehow, so, well,
it's really, really brittle.
/proc breaking it already isn't very surprising.
OG.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/