Re: core files

Raul Miller (rdm@test.legislate.com)
Wed, 6 Jan 1999 15:51:31 -0500


Albert D. Cahalan <acahalan@cs.uml.edu> wrote:
> 1. Look for an exact security match.
> 2. If none, look for root.
> 3. If not found, dump core.
>
> Step 2 is really for setuid programs and servers that change UID.
> It is not intended to catch normal user processes. In fact, it
> should just dump a standard core if it catches one by accident.

It should also clear the setuid bit on the executable, and be very,
very careful to not step on anything when dumping core.

-- 
Raul

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/