diff options
| author | 2007-05-29 00:26:29 +0000 | |
|---|---|---|
| committer | 2007-05-29 00:26:29 +0000 | |
| commit | 686053bd0c0ccfa75e8847d00eb42e010e87d129 (patch) | |
| tree | afb4ddc7ddad9ce20bf110b7d80a9c6a081cdd5b /sys/kern/kern_sig.c | |
| parent | delete some overly fascist rules.. prodded by tom/jmc (diff) | |
| download | wireguard-openbsd-686053bd0c0ccfa75e8847d00eb42e010e87d129.tar.xz wireguard-openbsd-686053bd0c0ccfa75e8847d00eb42e010e87d129.zip | |
update comment re nosuidcoredump sysctl
ok tedu
Diffstat (limited to 'sys/kern/kern_sig.c')
| -rw-r--r-- | sys/kern/kern_sig.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c index 24d2e2e60ec..d1135a04f21 100644 --- a/sys/kern/kern_sig.c +++ b/sys/kern/kern_sig.c @@ -1,4 +1,4 @@ -/* $OpenBSD: kern_sig.c,v 1.92 2007/05/29 00:03:18 tedu Exp $ */ +/* $OpenBSD: kern_sig.c,v 1.93 2007/05/29 00:26:29 jcs Exp $ */ /* $NetBSD: kern_sig.c,v 1.54 1996/04/22 01:38:32 christos Exp $ */ /* @@ -1363,7 +1363,8 @@ coredump(struct proc *p) /* * Don't dump if not root and the process has used set user or - * group privileges. + * group privileges, unless the nosuidcoredump sysctl is set to 2, + * in which case dumps are put into /var/crash/. */ if (((p->p_flag & P_SUGID) && (error = suser(p, 0))) || ((p->p_flag & P_SUGID) && nosuidcoredump)) { |
