diff options
-rw-r--r-- | sys/fs/procfs/procfs_ctl.c | 14 | ||||
-rw-r--r-- | sys/miscfs/procfs/procfs_ctl.c | 14 |
2 files changed, 20 insertions, 8 deletions
diff --git a/sys/fs/procfs/procfs_ctl.c b/sys/fs/procfs/procfs_ctl.c index 72ad575..f445572 100644 --- a/sys/fs/procfs/procfs_ctl.c +++ b/sys/fs/procfs/procfs_ctl.c @@ -111,6 +111,16 @@ procfs_control(curp, p, op) int error; /* + * Authorization check: rely on normal debugging protection, except + * allow processes to disengage debugging on a process onto which + * they have previously attached, but no longer have permission to + * debug. + */ + if (op != PROCFS_CTL_DETACH && + ((error = p_can(curp, p, P_CAN_DEBUG, NULL)))) + return (error); + + /* * Attach - attaches the target process for debugging * by the calling process. */ @@ -123,10 +133,6 @@ procfs_control(curp, p, op) if (p->p_pid == curp->p_pid) return (EINVAL); - /* can't trace init when securelevel > 0 */ - if (securelevel > 0 && p->p_pid == 1) - return (EPERM); - /* * Go ahead and set the trace flag. * Save the old parent (it's reset in diff --git a/sys/miscfs/procfs/procfs_ctl.c b/sys/miscfs/procfs/procfs_ctl.c index 72ad575..f445572 100644 --- a/sys/miscfs/procfs/procfs_ctl.c +++ b/sys/miscfs/procfs/procfs_ctl.c @@ -111,6 +111,16 @@ procfs_control(curp, p, op) int error; /* + * Authorization check: rely on normal debugging protection, except + * allow processes to disengage debugging on a process onto which + * they have previously attached, but no longer have permission to + * debug. + */ + if (op != PROCFS_CTL_DETACH && + ((error = p_can(curp, p, P_CAN_DEBUG, NULL)))) + return (error); + + /* * Attach - attaches the target process for debugging * by the calling process. */ @@ -123,10 +133,6 @@ procfs_control(curp, p, op) if (p->p_pid == curp->p_pid) return (EINVAL); - /* can't trace init when securelevel > 0 */ - if (securelevel > 0 && p->p_pid == 1) - return (EPERM); - /* * Go ahead and set the trace flag. * Save the old parent (it's reset in |