From owner-freebsd-hackers@freebsd.org Tue Aug 28 16:47:11 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3FAEE1091597 for ; Tue, 28 Aug 2018 16:47:11 +0000 (UTC) (envelope-from danilogondolfo@gmail.com) Received: from mail-ua1-x935.google.com (mail-ua1-x935.google.com [IPv6:2607:f8b0:4864:20::935]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 665238C76D; Tue, 28 Aug 2018 16:47:10 +0000 (UTC) (envelope-from danilogondolfo@gmail.com) Received: by mail-ua1-x935.google.com with SMTP id y10-v6so1428597uao.4; Tue, 28 Aug 2018 09:47:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=gUSf3kvkSHIlnfow5xv9X9RnJeeTL/vZV73E83dqub0=; b=TxM6XZvsIYm4DisfXVYnlRZj5bHZ56nPM5fuuB3vibst4i9NEF8rYH3VyVBhWADEbv mO+8+wCDI3x0/awRdh/QcNAx6JIl5OAk0S6P2ezQcRHHH5zwGHem+tjFbXYxLXo+Lnp6 rWkre7lWWchUGCZcL2+IoPikDSWq+ZY7G7vnww0S7vhWPeKlS31UdB0/wbLJRUxPfOpU jw1wzcMICNKWFpd3QY+PYfTQmJrKnR/zwASGC6Gp9+82G0xwk9itJqvGAJx0BBJPMaI1 SyNv6+VJ10DxY/X9KPHh/dYHsEubRnLYyvcMrL6dgYcg/4KeQlr2LxBqlP0Tq9m0nhrD B1Uw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=gUSf3kvkSHIlnfow5xv9X9RnJeeTL/vZV73E83dqub0=; b=DSCVfbDutmCe2tPBdhqpRWwqGbso5zLtufeBeaVIK1dQNnZ9xPsgtbNEJEUFLxdOD0 QfCtADqCFcyQ9MnSJ1h5QX8GlElfWw9WD168gFYNPNqH2xGgW2E5o6eRaUagFMJzl79d 5gcLFUPUDnBFcqYeq+ZKsXYPhZxQJSov82JCeMWeQJ8rg/JdAEaj2DXG9e+OeMR4kmWd 35PHqsixv2pa3cnb6mbXefqUEohTCbZsljcUfyKdj+n2TNpd5RzAFrmbbd6GAlLeaYhC /LARoXS4kZn4sMhiWd5OgEwhN7MDeWeogtj0Wgh0YNe0G/CWCWbrR78kKkOpPAFMtBJR G/sg== X-Gm-Message-State: APzg51BTz6LFzD/QLGxvYmteBVqh6/zmcVYIJjZ2OBb+/DU1IMRlK0F+ wq8kifLEvIhYGuN0kzSzeqY9ABmvY4QOPH4wMpo= X-Google-Smtp-Source: ANB0VdbwnW7jS07PF9/RyTU2Togf1PAk6KX5Rgo0y/zTnvUz04WEZNes9gnrL1B+Y1UE4OAzjIwOABjegZ908L3clJ4= X-Received: by 2002:a9f:3f8c:: with SMTP id k12-v6mr1598717uaj.38.1535474829443; Tue, 28 Aug 2018 09:47:09 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: =?UTF-8?Q?Danilo_Eg=C3=AAa_Gondolfo?= Date: Tue, 28 Aug 2018 13:46:57 -0300 Message-ID: Subject: Re: angel(2) system call, the quest for immortality, aka kill(2) with SIGSTOP/SIGKILL will *not* work To: Warm White Wolf Cc: asomers@freebsd.org, freebsd-hackers@freebsd.org X-Mailman-Approved-At: Tue, 28 Aug 2018 18:28:04 +0000 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Aug 2018 16:47:11 -0000 Interesting, next time someone inject a bitcoin miner in a jail running an untrusted php system you'll need a reboot to stop it... On Tue, 28 Aug 2018, 13:38 Warm White Wolf, wrote: > Seriously : suppose your well crafted, eventually audited program, is more > important than > your whole informatic system, perhaps the raison d'etre of your business. > You want to live, > more than the 1% errors of your sysadmins. > > Ludic : you have an account in the Unix machines at your university. You > wrote your small > HTTPD, and you want that your sysadmins won't kill your power-httpd. > > fork(void) was pretty extremy at it's time... > > As a power Unix-user, a config option for the kernel, at compile-time, can > be provided... > > > On Tue, Aug 28, 2018 at 5:46 PM Alan Somers wrote: > > > On Tue, Aug 28, 2018 at 2:59 AM Warm White Wolf > > > wrote: > > > >> Greetings ! > >> > >> I have developed a new system call, be it named angel(2), > >> on Linux operating system (this is what I know), which makes > >> a program invulnerable to kill(2) calls, including SIGKILL and > >> SIGSTOP. > >> > >> The uses may involve fork() + angel(), daemon() + angel(), > >> setsid() + angel(), exec*() + angel(). > >> > >> Use the intellectual property I give you, as a gift to the BSD > >> operating system, using 4- 3- 2- BSD licence. That's it, name > >> me in the sources. > >> > >> Thank you, FreeBSD ! > >> You are a great Unix operating system ! > >> > > > > What are the applications? Blocking SIGKILL is pretty extreme. > > -Alan > > > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" >