diff options
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/ptrace.c | 20 |
1 files changed, 17 insertions, 3 deletions
diff --git a/kernel/ptrace.c b/kernel/ptrace.c index 921c22ad16e4..6252d2fa2bf3 100644 --- a/kernel/ptrace.c +++ b/kernel/ptrace.c | |||
| @@ -120,8 +120,18 @@ int ptrace_check_attach(struct task_struct *child, int kill) | |||
| 120 | 120 | ||
| 121 | static int may_attach(struct task_struct *task) | 121 | static int may_attach(struct task_struct *task) |
| 122 | { | 122 | { |
| 123 | if (!task->mm) | 123 | /* May we inspect the given task? |
| 124 | return -EPERM; | 124 | * This check is used both for attaching with ptrace |
| 125 | * and for allowing access to sensitive information in /proc. | ||
| 126 | * | ||
| 127 | * ptrace_attach denies several cases that /proc allows | ||
| 128 | * because setting up the necessary parent/child relationship | ||
| 129 | * or halting the specified task is impossible. | ||
| 130 | */ | ||
| 131 | int dumpable = 0; | ||
| 132 | /* Don't let security modules deny introspection */ | ||
| 133 | if (task == current) | ||
| 134 | return 0; | ||
| 125 | if (((current->uid != task->euid) || | 135 | if (((current->uid != task->euid) || |
| 126 | (current->uid != task->suid) || | 136 | (current->uid != task->suid) || |
| 127 | (current->uid != task->uid) || | 137 | (current->uid != task->uid) || |
| @@ -130,7 +140,9 @@ static int may_attach(struct task_struct *task) | |||
| 130 | (current->gid != task->gid)) && !capable(CAP_SYS_PTRACE)) | 140 | (current->gid != task->gid)) && !capable(CAP_SYS_PTRACE)) |
| 131 | return -EPERM; | 141 | return -EPERM; |
| 132 | smp_rmb(); | 142 | smp_rmb(); |
| 133 | if (!task->mm->dumpable && !capable(CAP_SYS_PTRACE)) | 143 | if (task->mm) |
| 144 | dumpable = task->mm->dumpable; | ||
| 145 | if (!dumpable && !capable(CAP_SYS_PTRACE)) | ||
| 134 | return -EPERM; | 146 | return -EPERM; |
| 135 | 147 | ||
| 136 | return security_ptrace(current, task); | 148 | return security_ptrace(current, task); |
| @@ -176,6 +188,8 @@ repeat: | |||
| 176 | goto repeat; | 188 | goto repeat; |
| 177 | } | 189 | } |
| 178 | 190 | ||
| 191 | if (!task->mm) | ||
| 192 | goto bad; | ||
| 179 | /* the same process cannot be attached many times */ | 193 | /* the same process cannot be attached many times */ |
| 180 | if (task->ptrace & PT_PTRACED) | 194 | if (task->ptrace & PT_PTRACED) |
| 181 | goto bad; | 195 | goto bad; |
