Is there any reason for setting current->dumpable to 0 in sys_setuid()?
It seems to me it doesn't close any security problem (since you need to
be root to change UID and if it the program was setuid, core dumps
should have been already disabled at this point) and it makes debugging
of daemons switching their UID a lot harder.
Have a nice fortnight
-- Martin `MJ' Mares <email@example.com> http://atrey.karlin.mff.cuni.cz/~mj/ Faculty of Math and Physics, Charles University, Prague, Czech Rep., Earth "P.C.M.C.I.A. stands for `People Can't Memorize Computer Industry Acronyms'"
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to firstname.lastname@example.org Please read the FAQ at http://www.tux.org/lkml/