diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2016-09-21 12:45:37 +0200 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2016-09-21 12:46:09 +0200 |
| commit | f1a5d77ac3961abab50dabe9c02835b0bdce5975 (patch) | |
| tree | 859866534cd2a3db7620bfcd9da13161f59edc91 | |
| parent | 5681553cb80fa2221fc711af8f6d89b406dbeb8b (diff) | |
| download | man-pages-f1a5d77ac3961abab50dabe9c02835b0bdce5975.tar.gz | |
proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
| -rw-r--r-- | man5/proc.5 | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/man5/proc.5 b/man5/proc.5 index 8391cb6eeb..3a5f4407c6 100644 --- a/man5/proc.5 +++ b/man5/proc.5 @@ -4057,6 +4057,7 @@ Three different integer values can be specified: .RS .TP \fI0\ (default)\fP +.\" In kernel source: SUID_DUMP_DISABLE This provides the traditional (pre-Linux 2.6.13) behavior. A core dump will not be produced for a process which has changed credentials (by calling @@ -4066,6 +4067,7 @@ or similar, or by executing a set-user-ID or set-group-ID program) or whose binary does not have read permission enabled. .TP \fI1\ ("debug")\fP +.\" In kernel source: SUID_DUMP_USER All processes dump core when possible. (Reasons why a process might nevertheless not dump core are described in .BR core (5).) @@ -4076,6 +4078,7 @@ this mode is insecure because it allows unprivileged users to examine the memory contents of privileged processes. .TP \fI2\ ("suidsafe")\fP +.\" In kernel source: SUID_DUMP_ROOT Any binary which normally would not be dumped (see "0" above) is dumped readable by root only. This allows the user to remove the core dump file but not to read it. |
