|
@@ -27,6 +27,35 @@
|
|
|
#include <linux/cn_proc.h>
|
|
|
#include <linux/compat.h>
|
|
|
|
|
|
+/*
|
|
|
+ * Access another process' address space via ptrace.
|
|
|
+ * Source/target buffer must be kernel space,
|
|
|
+ * Do not walk the page table directly, use get_user_pages
|
|
|
+ */
|
|
|
+int ptrace_access_vm(struct task_struct *tsk, unsigned long addr,
|
|
|
+ void *buf, int len, unsigned int gup_flags)
|
|
|
+{
|
|
|
+ struct mm_struct *mm;
|
|
|
+ int ret;
|
|
|
+
|
|
|
+ mm = get_task_mm(tsk);
|
|
|
+ if (!mm)
|
|
|
+ return 0;
|
|
|
+
|
|
|
+ if (!tsk->ptrace ||
|
|
|
+ (current != tsk->parent) ||
|
|
|
+ ((get_dumpable(mm) != SUID_DUMP_USER) &&
|
|
|
+ !ptracer_capable(tsk, mm->user_ns))) {
|
|
|
+ mmput(mm);
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
+
|
|
|
+ ret = __access_remote_vm(tsk, mm, addr, buf, len, gup_flags);
|
|
|
+ mmput(mm);
|
|
|
+
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
/*
|
|
|
* ptrace a task: make the debugger its new parent and
|
|
@@ -39,6 +68,9 @@ void __ptrace_link(struct task_struct *child, struct task_struct *new_parent)
|
|
|
BUG_ON(!list_empty(&child->ptrace_entry));
|
|
|
list_add(&child->ptrace_entry, &new_parent->ptraced);
|
|
|
child->parent = new_parent;
|
|
|
+ rcu_read_lock();
|
|
|
+ child->ptracer_cred = get_cred(__task_cred(new_parent));
|
|
|
+ rcu_read_unlock();
|
|
|
}
|
|
|
|
|
|
/**
|
|
@@ -71,12 +103,16 @@ void __ptrace_link(struct task_struct *child, struct task_struct *new_parent)
|
|
|
*/
|
|
|
void __ptrace_unlink(struct task_struct *child)
|
|
|
{
|
|
|
+ const struct cred *old_cred;
|
|
|
BUG_ON(!child->ptrace);
|
|
|
|
|
|
clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
|
|
|
|
|
|
child->parent = child->real_parent;
|
|
|
list_del_init(&child->ptrace_entry);
|
|
|
+ old_cred = child->ptracer_cred;
|
|
|
+ child->ptracer_cred = NULL;
|
|
|
+ put_cred(old_cred);
|
|
|
|
|
|
spin_lock(&child->sighand->siglock);
|
|
|
child->ptrace = 0;
|
|
@@ -220,7 +256,7 @@ static int ptrace_has_cap(struct user_namespace *ns, unsigned int mode)
|
|
|
static int __ptrace_may_access(struct task_struct *task, unsigned int mode)
|
|
|
{
|
|
|
const struct cred *cred = current_cred(), *tcred;
|
|
|
- int dumpable = 0;
|
|
|
+ struct mm_struct *mm;
|
|
|
kuid_t caller_uid;
|
|
|
kgid_t caller_gid;
|
|
|
|
|
@@ -271,16 +307,11 @@ static int __ptrace_may_access(struct task_struct *task, unsigned int mode)
|
|
|
return -EPERM;
|
|
|
ok:
|
|
|
rcu_read_unlock();
|
|
|
- smp_rmb();
|
|
|
- if (task->mm)
|
|
|
- dumpable = get_dumpable(task->mm);
|
|
|
- rcu_read_lock();
|
|
|
- if (dumpable != SUID_DUMP_USER &&
|
|
|
- !ptrace_has_cap(__task_cred(task)->user_ns, mode)) {
|
|
|
- rcu_read_unlock();
|
|
|
- return -EPERM;
|
|
|
- }
|
|
|
- rcu_read_unlock();
|
|
|
+ mm = task->mm;
|
|
|
+ if (mm &&
|
|
|
+ ((get_dumpable(mm) != SUID_DUMP_USER) &&
|
|
|
+ !ptrace_has_cap(mm->user_ns, mode)))
|
|
|
+ return -EPERM;
|
|
|
|
|
|
return security_ptrace_access_check(task, mode);
|
|
|
}
|
|
@@ -344,10 +375,6 @@ static int ptrace_attach(struct task_struct *task, long request,
|
|
|
|
|
|
if (seize)
|
|
|
flags |= PT_SEIZED;
|
|
|
- rcu_read_lock();
|
|
|
- if (ns_capable(__task_cred(task)->user_ns, CAP_SYS_PTRACE))
|
|
|
- flags |= PT_PTRACE_CAP;
|
|
|
- rcu_read_unlock();
|
|
|
task->ptrace = flags;
|
|
|
|
|
|
__ptrace_link(task, current);
|
|
@@ -537,7 +564,8 @@ int ptrace_readdata(struct task_struct *tsk, unsigned long src, char __user *dst
|
|
|
int this_len, retval;
|
|
|
|
|
|
this_len = (len > sizeof(buf)) ? sizeof(buf) : len;
|
|
|
- retval = access_process_vm(tsk, src, buf, this_len, FOLL_FORCE);
|
|
|
+ retval = ptrace_access_vm(tsk, src, buf, this_len, FOLL_FORCE);
|
|
|
+
|
|
|
if (!retval) {
|
|
|
if (copied)
|
|
|
break;
|
|
@@ -564,7 +592,7 @@ int ptrace_writedata(struct task_struct *tsk, char __user *src, unsigned long ds
|
|
|
this_len = (len > sizeof(buf)) ? sizeof(buf) : len;
|
|
|
if (copy_from_user(buf, src, this_len))
|
|
|
return -EFAULT;
|
|
|
- retval = access_process_vm(tsk, dst, buf, this_len,
|
|
|
+ retval = ptrace_access_vm(tsk, dst, buf, this_len,
|
|
|
FOLL_FORCE | FOLL_WRITE);
|
|
|
if (!retval) {
|
|
|
if (copied)
|
|
@@ -1128,7 +1156,7 @@ int generic_ptrace_peekdata(struct task_struct *tsk, unsigned long addr,
|
|
|
unsigned long tmp;
|
|
|
int copied;
|
|
|
|
|
|
- copied = access_process_vm(tsk, addr, &tmp, sizeof(tmp), FOLL_FORCE);
|
|
|
+ copied = ptrace_access_vm(tsk, addr, &tmp, sizeof(tmp), FOLL_FORCE);
|
|
|
if (copied != sizeof(tmp))
|
|
|
return -EIO;
|
|
|
return put_user(tmp, (unsigned long __user *)data);
|
|
@@ -1139,7 +1167,7 @@ int generic_ptrace_pokedata(struct task_struct *tsk, unsigned long addr,
|
|
|
{
|
|
|
int copied;
|
|
|
|
|
|
- copied = access_process_vm(tsk, addr, &data, sizeof(data),
|
|
|
+ copied = ptrace_access_vm(tsk, addr, &data, sizeof(data),
|
|
|
FOLL_FORCE | FOLL_WRITE);
|
|
|
return (copied == sizeof(data)) ? 0 : -EIO;
|
|
|
}
|
|
@@ -1157,7 +1185,7 @@ int compat_ptrace_request(struct task_struct *child, compat_long_t request,
|
|
|
switch (request) {
|
|
|
case PTRACE_PEEKTEXT:
|
|
|
case PTRACE_PEEKDATA:
|
|
|
- ret = access_process_vm(child, addr, &word, sizeof(word),
|
|
|
+ ret = ptrace_access_vm(child, addr, &word, sizeof(word),
|
|
|
FOLL_FORCE);
|
|
|
if (ret != sizeof(word))
|
|
|
ret = -EIO;
|
|
@@ -1167,7 +1195,7 @@ int compat_ptrace_request(struct task_struct *child, compat_long_t request,
|
|
|
|
|
|
case PTRACE_POKETEXT:
|
|
|
case PTRACE_POKEDATA:
|
|
|
- ret = access_process_vm(child, addr, &data, sizeof(data),
|
|
|
+ ret = ptrace_access_vm(child, addr, &data, sizeof(data),
|
|
|
FOLL_FORCE | FOLL_WRITE);
|
|
|
ret = (ret != sizeof(data) ? -EIO : 0);
|
|
|
break;
|