system: Allow users to PTRACE_ATTACH to their own processes.
authorLudovic Courtès <ludo@gnu.org>
Sun, 12 Apr 2015 13:33:42 +0000 (15:33 +0200)
committerLudovic Courtès <ludo@gnu.org>
Sun, 12 Apr 2015 13:33:42 +0000 (15:33 +0200)
* gnu/build/activation.scm (activate-ptrace-attach): New procedure.
* gnu/system.scm (operating-system-activation-script): Use it.

gnu/build/activation.scm
gnu/system.scm

index 64c3410..0c60355 100644 (file)
@@ -30,6 +30,7 @@
             activate-/bin/sh
             activate-modprobe
             activate-firmware
+            activate-ptrace-attach
             activate-current-system))
 
 ;;; Commentary:
@@ -335,6 +336,18 @@ by itself, without having to resort to a \"user helper\"."
     (lambda (port)
       (display directory port))))
 
+(define (activate-ptrace-attach)
+  "Allow users to PTRACE_ATTACH their own processes.
+
+This works around a regression introduced in the default \"security\" policy
+found in Linux 3.4 onward that prevents users from attaching to their own
+processes--see Yama.txt in the Linux source tree for the rationale.  This
+sounds like an unacceptable restriction for little or no security
+improvement."
+  (call-with-output-file "/proc/sys/kernel/yama/ptrace_scope"
+    (lambda (port)
+      (display 0 port))))
+
 \f
 (define %current-system
   ;; The system that is current (a symlink.)  This is not necessarily the same
index a91c713..6cf12df 100644 (file)
@@ -681,6 +681,9 @@ etc."
                     (activate-firmware
                      (string-append #$firmware "/lib/firmware"))
 
+                    ;; Let users debug their own processes!
+                    (activate-ptrace-attach)
+
                     ;; Run the services' activation snippets.
                     ;; TODO: Use 'load-compiled'.
                     (for-each primitive-load '#$actions)