Jiri Denemark 5e5acbc8d6 daemon: Fix core dumps if unix_sock_group is set
Setting unix_sock_group to something else than default "root" in
/etc/libvirt/libvirtd.conf prevents system libvirtd from dumping core on
crash. This is because we used setgid(unix_sock_group) before binding to
/var/run/libvirt/libvirt-sock* and setgid() back to original group.
However, if a process changes its effective or filesystem group ID, it
will be forbidden from leaving core dumps unless fs.suid_dumpable sysctl
is set to something else then 0 (and it is 0 by default).

Changing socket's group ownership after bind works better. And we can do
so without introducing a race condition since we loosen access rights by
changing the group from root to something else.
2011-01-10 11:01:46 +01:00
..
2010-12-13 16:09:50 -07:00
2010-12-21 13:21:25 -07:00
2009-09-21 14:41:45 +01:00
2010-07-23 17:30:33 -04:00
2010-07-23 17:30:33 -04:00
2010-07-23 17:30:33 -04:00
2010-07-23 17:30:33 -04:00
2010-11-23 15:04:42 -07:00