libvirt/daemon
Jiri Denemark 5e5acbc8d6 daemon: Fix core dumps if unix_sock_group is set
Setting unix_sock_group to something else than default "root" in
/etc/libvirt/libvirtd.conf prevents system libvirtd from dumping core on
crash. This is because we used setgid(unix_sock_group) before binding to
/var/run/libvirt/libvirt-sock* and setgid() back to original group.
However, if a process changes its effective or filesystem group ID, it
will be forbidden from leaving core dumps unless fs.suid_dumpable sysctl
is set to something else then 0 (and it is 0 by default).

Changing socket's group ownership after bind works better. And we can do
so without introducing a race condition since we loosen access rights by
changing the group from root to something else.
2011-01-10 11:01:46 +01:00
..
.gitignore
dispatch.c
dispatch.h
event.c
event.h
libvirtd.aug
libvirtd.c daemon: Fix core dumps if unix_sock_group is set 2011-01-10 11:01:46 +01:00
libvirtd.conf
libvirtd.h
libvirtd.init.in
libvirtd.lxc.logrotate.in
libvirtd.pod.in
libvirtd.policy-0
libvirtd.policy-1
libvirtd.qemu.logrotate.in
libvirtd.sasl
libvirtd.stp
libvirtd.sysconf
libvirtd.uml.logrotate.in
Makefile.am
mdns.c
mdns.h
probes.d
qemu_dispatch_args.h
qemu_dispatch_prototypes.h
qemu_dispatch_ret.h
qemu_dispatch_table.h
remote_dispatch_args.h
remote_dispatch_prototypes.h
remote_dispatch_ret.h
remote_dispatch_table.h
remote_generate_stubs.pl
remote.c
remote.h
stream.c
stream.h
test_libvirtd.aug Basic framework for auditing integration 2010-10-19 17:31:31 +01:00
THREADING.txt