mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-05-11 21:52:53 +00:00
Kernel+LibC: Introduce a "dumpable" flag for processes
This new flag controls two things: - Whether the kernel will generate core dumps for the process - Whether the EUID:EGID should own the process's files in /proc Processes are automatically made non-dumpable when their EUID or EGID is changed, either via syscalls that specifically modify those ID's, or via sys$execve(), when a set-uid or set-gid program is executed. A process can change its own dumpable flag at any time by calling the new sys$prctl(PR_SET_DUMPABLE) syscall. Fixes #4504.
This commit is contained in:
parent
3c9bd911b8
commit
82f86e35d6
Notes:
sideshowbarker
2024-07-19 00:36:28 +09:00
Author: https://github.com/awesomekling
Commit: 82f86e35d6
13 changed files with 199 additions and 7 deletions
|
@ -59,6 +59,9 @@ KResultOr<u32> handle_syscall(const Kernel::Syscall::SC_ptrace_params& params, P
|
|||
|| (peer->process().uid() != peer->process().euid())) // Disallow tracing setuid processes
|
||||
return KResult(-EACCES);
|
||||
|
||||
if (!peer->process().is_dumpable())
|
||||
return KResult(-EACCES);
|
||||
|
||||
auto& peer_process = peer->process();
|
||||
if (params.request == PT_ATTACH) {
|
||||
if (peer_process.tracer()) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue