Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751413AbdLUICI (ORCPT ); Thu, 21 Dec 2017 03:02:08 -0500 Received: from mx2.suse.de ([195.135.220.15]:43237 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750797AbdLUICG (ORCPT ); Thu, 21 Dec 2017 03:02:06 -0500 Date: Thu, 21 Dec 2017 09:02:03 +0100 From: Michal Hocko To: "Michael Kerrisk (man-pages)" Cc: Linux API , Manfred Spraul , Andrew Morton , Al Viro , Kees Cook , Linus Torvalds , Mike Waychison , LKML , "linux-mm@kvack.org" Subject: Re: shmctl(SHM_STAT) vs. /proc/sysvipc/shm permissions discrepancies Message-ID: <20171221080203.GZ4831@dhcp22.suse.cz> References: <20171219094848.GE2787@dhcp22.suse.cz> <20171220092025.GD4831@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2115 Lines: 49 On Wed 20-12-17 17:17:46, Michael Kerrisk wrote: > Hello Michal, > > On 20 December 2017 at 10:20, Michal Hocko wrote: > > On Tue 19-12-17 17:45:40, Michael Kerrisk wrote: > >> But, is > >> there a pressing reason to make the change? (Okay, I guess iterating > >> using *_STAT is nicer than parsing /proc/sysvipc/*.) > > > > The reporter of this issue claims that "Reading /proc/sysvipc/shm is way > > slower than executing the system call." I haven't checked that but I can > > imagine that /proc/sysvipc/shm can take quite some time when there are > > _many_ segments registered. > > Yes, that makes sense. > > > So they would like to use the syscall but > > the interacting parties do not have compatible permissions. > > So, I don't think there is any security issue, since the same info is > available in /proc/sysvipc/*. Well, I am not sure this is a valid argument (maybe I just misread your statement). Our security model _might_ be broken because of the sysipc proc interface existance already. I am not saying it is broken because I cannot see an attack vector based solely on the metadata information knowledge. An attacker still cannot see/modify the real data. But maybe there are some bugs lurking there and knowing the metadata might help to exploit them. I dunno. You are certainly right that modifying/adding STAT flag to comply with the proc interface permission model will not make the system any more vulnerable, though. > The only question would be whether > change in the *_STAT behavior might surprise some applications into > behaving differently. I presume the chances of that are low, but if it > was a concert, one could add new shmctl/msgctl/semctl *_STAT_ALL (or > some such) operations that have the desired behavior. I would lean towards _STAT_ALL because this is Linux specific behavior (I have looked at what BSD does here and they are checking permissions for STAT as well). It would also be simpler to revert if we ever find that this is a leak with security consequences. What do other people think? I can prepare a patch. -- Michal Hocko SUSE Labs