Hi, Christian: As I replied to Jann, I will remove the code that does the setting on others to make the code simpler and more secure. Thanks. -- Enke >> +static bool set_predump_signal_perm(struct task_struct *p) >> +{ >> + const struct cred *cred = current_cred(), *pcred = __task_cred(p); >> + >> + return uid_eq(pcred->uid, cred->euid) || >> + uid_eq(pcred->euid, cred->euid) || >> + capable(CAP_SYS_ADMIN); > > So before proceeding I'd like to discuss at least two points: > - how does this interact with the dumpability of a process? > - do we need the capable(CAP_SYS_ADMIN) restriction to init_user_ns? > Seems we could make this work per-user-ns just like > PRCTL_SET_PDEATHSIG does? > >> +}