In article <[EMAIL PROTECTED]>,
Helge Hafting <[EMAIL PROTECTED]> wrote:
>richard offer wrote:
>>
>> In arch/i386/kernel/ptrace.c there is the following code ...
>>
>> ret = -EPERM;
>> if (pid == 1) /* you may not mess with init */
>> goto out_tsk;
>>
richard offer wrote:
>
> In arch/i386/kernel/ptrace.c there is the following code ...
>
> ret = -EPERM;
> if (pid == 1) /* you may not mess with init */
> goto out_tsk;
>
> What is the rationale for this ? Is this a real security decision or
> an implem
In arch/i386/kernel/ptrace.c there is the following code ...
ret = -EPERM;
if (pid == 1) /* you may not mess with init */
goto out_tsk;
What is the rationale for this ? Is this a real security decision or
an implementation detail (bad things will happ
3 matches
Mail list logo