* Glynn Clements wrote on Fri, Jan 10, 2003 at 20:32 +0000: > In 2.4.20, the actual permission checks for ptrace() are (from > kernel/ptrace.c): > > if (!task->mm->dumpable && !capable(CAP_SYS_PTRACE)) > goto bad; This is really "&&"? I had guessed, that if there is no CAP_SYS_PTRACE, there is no ptrace allowed at all, and same sounds logical for the "dumpable". What I'm missing? oki, Steffen -- Dieses Schreiben wurde maschinell erstellt, es trägt daher weder Unterschrift noch Siegel.
This archive was generated by hypermail 2b30 : Mon Jan 13 2003 - 07:53:32 PST