Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2817990imm; Tue, 4 Sep 2018 10:28:10 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYbf+DBwe6N6OcsGf9ezCNKtC6MB6Iq7DMkIko6IFKLdf6V0JZQVny6ZH5DqkmQRu0/+yXl X-Received: by 2002:a17:902:724c:: with SMTP id c12-v6mr34263552pll.326.1536082090869; Tue, 04 Sep 2018 10:28:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536082090; cv=none; d=google.com; s=arc-20160816; b=E+XJNlGj80wxesiBxoaph+R1KyDir7gbAjuZbHS+prZAps7Q7uq0uxTq2oNiF+MYZs p0CTpHXUVjJSnRK2quoTjPB8a4MjYIqBaql7gqZ/CpZ5oVSn0cHp6wv3HlczofdHlX1Y iiC5JY2RT62abUTfmCBEdKbI2bXQ6/vh20B5YHSYHcUMcxvvRVewEdIvZQEt+G5ExzkS qfgCR9VLJOtcPA70AXAjhDRNuhVT510zG7fPhXMTvuewpkvnvfOm7uZKDgWVB0Qq4cMC YFIMzPLCtaQzacys6M4WhTZWtkp3EZN18vHOhKVgedhJbCe8uj9fFMtJy6H3nnjJISCh NXZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:subject:autocrypt:openpgp:from:references:cc:to :arc-authentication-results; bh=7SMEvpSdz4RU8XgdSh69g9zRgS6D3ZxN6bfLph38nTA=; b=RROQOdQDA/qi1/gKVIcA8EzP4iFSsH8crhCzo6/C7sloe7+Pb27RiLsF6hiFho0CB5 dyE5sXpO0klx/kv+eFwm/4TmWax7W9aAYwOeOsk2GVJroVGIb5/N/MOn2kEL4NI09oJd M27b4zZ9axgsGmh765Y+wm78e6oEjqEBiBlsVVGZFVKbzFYO4sqANQmLekbksO2UJB0y jBAXHCCVYOJGUbF/d4QSBbQ00SYnwxRc7kJuLeASdU+eOSpwLKTBNDTJTLSebBP8ObxK OJv6fqhFmLmZQj8WAmuuOcq+C0y1GnsZ0D8nhUwgauk++OAECKskQxvdOwJrc4jWQcwK AeqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g31-v6si21392372pld.158.2018.09.04.10.27.55; Tue, 04 Sep 2018 10:28:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727765AbeIDVwv (ORCPT + 99 others); Tue, 4 Sep 2018 17:52:51 -0400 Received: from mga12.intel.com ([192.55.52.136]:58565 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726528AbeIDVwv (ORCPT ); Tue, 4 Sep 2018 17:52:51 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Sep 2018 10:26:48 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,329,1531810800"; d="scan'208";a="85955842" Received: from schen9-desk.jf.intel.com (HELO [10.54.74.135]) ([10.54.74.135]) by fmsmga004.fm.intel.com with ESMTP; 04 Sep 2018 10:26:43 -0700 To: Jiri Kosina , Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , "Woodhouse, David" , Oleg Nesterov , Casey Schaufler Cc: linux-kernel@vger.kernel.org, x86@kernel.org References: From: Tim Chen Openpgp: preference=signencrypt Autocrypt: addr=tim.c.chen@linux.intel.com; prefer-encrypt=mutual; keydata= xsFNBE6ONugBEAC1c8laQ2QrezbYFetwrzD0v8rOqanj5X1jkySQr3hm/rqVcDJudcfdSMv0 BNCCjt2dofFxVfRL0G8eQR4qoSgzDGDzoFva3NjTJ/34TlK9MMouLY7X5x3sXdZtrV4zhKGv 3Rt2osfARdH3QDoTUHujhQxlcPk7cwjTXe4o3aHIFbcIBUmxhqPaz3AMfdCqbhd7uWe9MAZX 7M9vk6PboyO4PgZRAs5lWRoD4ZfROtSViX49KEkO7BDClacVsODITpiaWtZVDxkYUX/D9OxG AkxmqrCxZxxZHDQos1SnS08aKD0QITm/LWQtwx1y0P4GGMXRlIAQE4rK69BDvzSaLB45ppOw AO7kw8aR3eu/sW8p016dx34bUFFTwbILJFvazpvRImdjmZGcTcvRd8QgmhNV5INyGwtfA8sn L4V13aZNZA9eWd+iuB8qZfoFiyAeHNWzLX/Moi8hB7LxFuEGnvbxYByRS83jsxjH2Bd49bTi XOsAY/YyGj6gl8KkjSbKOkj0IRy28nLisFdGBvgeQrvaLaA06VexptmrLjp1Qtyesw6zIJeP oHUImJltjPjFvyfkuIPfVIB87kukpB78bhSRA5mC365LsLRl+nrX7SauEo8b7MX0qbW9pg0f wsiyCCK0ioTTm4IWL2wiDB7PeiJSsViBORNKoxA093B42BWFJQARAQABzTRUaW0gQ2hlbiAo d29yayByZWxhdGVkKSA8dGltLmMuY2hlbkBsaW51eC5pbnRlbC5jb20+wsF+BBMBAgAoAhsD BgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAUCWfPBPgUJDyfxUQAKCRCiZ7WKota4SReFEACa 5ruzJM/hXJguHJY8i95rxHfLOgE7QoDgsR2aK2C1BSu84StTcT9BMikndQ0em28mpd1zROCs FvJ8Dzpp923699FU7s70+bFG9zIWtAOLWt2QyIMYImILzKkzkyLZo2RTcLNdUWS5fkAtjspQ QPg29W+kcbX1NhB6WDdbvk2HNeZoDh4A5ucOzKjEPqbSFIbw2Wt3RUmXxezjH1NzZG3fMkEN cT7JezYhUxvi2PrJlD+mo26q2/PQmFgF49tneRJXmYyie5o2+ClfFVO9I6Rd1k7hS9uXQLg3 udpnDKobNYZ7/+O5+ucp0Y/MwzTfBYmtJ5fBjUTi2L1RMDJee8WqCNY1VU6cQ8MD4KstxUp2 bxlSRAYaDtNa1Omr61E7BA1Cc2E3cIt/O1mMfudWUjCND8qrAtEnugqKjk5tJJZzmzIKSHPY dCiJtOBQaVAYYchXF2hwOKhpFS43V4FdWLlM1CnFXsmbk48hGbiA8XHU85JBCXmG0i4qUlKn x2ilChvq4A102ahnlGbEmFaSwxuqR/5lhai6lOkwHXDFUT6jblaSs24L3MTn/vXtvwaLEEKh SPzNaj7yFvEhrJoLiZmDm0SZuPbQ+wrmPWUbzyf5te2Oq0JyrHTQJoQqn+CwGqwF/JaUq60f VuUD3T0icgsfljsOA4apyH7kyfxXGP0hOM7BTQROjjboARAAx+LxKhznLH0RFvuBEGTcntrC 3S0tpYmVsuWbdWr2ZL9VqZmXh6UWb0K7w7OpPNW1FiaWtVLnG1nuMmBJhE5jpYsi+yU8sbMA 5BEiQn2hUo0k5eww5/oiyNI9H7vql9h628JhYd9T1CcDMghTNOKfCPNGzQ8Js33cFnszqL4I N9jh+qdg5FnMHs/+oBNtlvNjD1dQdM6gm8WLhFttXNPn7nRUPuLQxTqbuoPgoTmxUxR3/M5A KDjntKEdYZziBYfQJkvfLJdnRZnuHvXhO2EU1/7bAhdz7nULZktw9j1Sp9zRYfKRnQdIvXXa jHkOn3N41n0zjoKV1J1KpAH3UcVfOmnTj+u6iVMW5dkxLo07CddJDaayXtCBSmmd90OG0Odx cq9VaIu/DOQJ8OZU3JORiuuq40jlFsF1fy7nZSvQFsJlSmHkb+cDMZDc1yk0ko65girmNjMF hsAdVYfVsqS1TJrnengBgbPgesYO5eY0Tm3+0pa07EkONsxnzyWJDn4fh/eA6IEUo2JrOrex O6cRBNv9dwrUfJbMgzFeKdoyq/Zwe9QmdStkFpoh9036iWsj6Nt58NhXP8WDHOfBg9o86z9O VMZMC2Q0r6pGm7L0yHmPiixrxWdW0dGKvTHu/DH/ORUrjBYYeMsCc4jWoUt4Xq49LX98KDGN dhkZDGwKnAUAEQEAAcLBZQQYAQIADwIbDAUCVEAL2AUJC1VvawAKCRCiZ7WKota4SWWrD/9L 4H3kHUR9qPTfSpwFBV0+PspkpMQmRQ9cQauIRXL+qIqCYfx48Jz/WZkq47COhY4d1tAvX4qv lviIoCwShAHhVkxD2rWFpa6Yang7cyPDjS6sNChsZ9aTAP0zX4LLHN8ub5LwCcU9JA4Avwdy NDSeeSeqNq9QOvVd2bDmyHxgVv4zRgLTNPH28hXAnDODy0wCJWg53PWvlp35XfWdIsC0ZAPK vgA1Bh+FYYKfT8Uzj8J/SYH+chmeYMt+8Y+FZa+NybivWJg6+UaJ2fCTuKCc7TgqLneBudox izWQMnBso0tHOT6+ju+L+ewPWc0OrJdKJeadrE2T1E949vMup5jG0lJLeSpBNmELODNL0xz6 Erjs/pwX7cYGKUbJfBaQcC9frPfpWfSqnK5X+12HFDxAxquXKC4ejBJOhbo3xx0sziiPTC3m 4LvLkEa9evQNtMvRcnWY5qIC4YdT5waC0stYNpyCiBXpYArKYCmlra3xpgAe0MRL94PHU4UW yxxdxRubFYna9LeNcWL7C0w2ngg1jd0tjRjLnimrOL8rSVUzwjNSQOV37tWTueTr40M/SfjU B6bifflZQpeSY8IpqzKqB0vvxo2xD0rU7JqUh7rW8U6rg2JEzVgYiHS4cf/vJMHuauHAjH7a ys7DYlLhlOVo3o0jOor4xuZPrWbSp4w51sLBZQQYAQIADwIbDAUCWfPBJQUJDyfxOAAKCRCi Z7WKota4SZKQD/wLu3j8kgATic+wF3ekngjwPcW3JhbQJeHxUZwsb9OgVMHumlrZHGoltKQu FfAhG/sOfuAh5f7QMzzA1M+2JD1Q6lr74vUHNBu+xBFMgZstE6hpkKmn0pNZ5JS3iZRVRLBx dWw63DYr0GM80vmbHjAhwxoF2PsO2/PkWTc68+pFyl3Dy0heZSJii81hkzh8FnF8CaMH0VXu MJoWyuYgnC058hHj0QqXvlNx9LzMtmrsskTmPvwqXTgG/dTEfTkQ4RfX3enrBy55cg9tMc88 BEQ/0/JV1bCDwyWXKRpz6FsHbICGQ4G9TTD4pS5QJ+oRQccMjfiDM3rFTcG1RYP2lHXjSm9c 0VnimpQBz3LarrdHJilmTHbAWf5KLmtWfYXHrlncnhnCtw2nfwBBdy8cQW4tUyniSVRLOwGm eJziyuPJ5SVVZcil2oN5/o7js7BYAeAV/WVF2Sk/blnXaaObIYIVqnDhV4N0oUz1KXq1Leem Uvjo5rljmmhOBdgl6D0scXCWICbuuWN9eW2fZl38hBSI3M0MX0jnV2e+0FY+76iNmKadpTDw gY3OaQAZ/UlJVI+pRV4JtRrajtpo9Vb38SBPXwp9moWmwVQyIdFUXjCTQARvxjRsUoPVu9oA SCd9W74oOgrqC1hadvVU867d07PlWksfYwCeYP4bs+4GSLzI1w== Subject: Re: [PATCH v3 1/3] ptrace: Provide ___ptrace_may_access() that can be applied on arbitrary tasks Message-ID: <31436186-88da-324e-88a0-8fdca7bf60ac@linux.intel.com> Date: Tue, 4 Sep 2018 10:26:43 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/04/2018 07:40 AM, Jiri Kosina wrote: > From: Jiri Kosina > > Current ptrace_may_access() implementation assumes that the 'source' task is > always the caller (current). > > Expose ___ptrace_may_access() that can be used to apply the check on arbitrary > tasks. Casey recently has proposed putting the decision making of whether to do IBPB in the security module. https://lwn.net/ml/kernel-hardening/20180815235355.14908-4-casey.schaufler@intel.com/ That will have the advantage of giving the administrator a more flexibility of when to turn on IBPB. The policy is very similar to what you have proposed here but I think the security module is a more appropriate place for the security policy. Thanks. Tim > > Originally-by: Tim Chen > Signed-off-by: Jiri Kosina > --- > > Sorry for the resend, my pine is buggered and broke threading. > > include/linux/ptrace.h | 12 ++++++++++++ > kernel/ptrace.c | 13 ++++++++++--- > 2 files changed, 22 insertions(+), 3 deletions(-) > > diff --git a/include/linux/ptrace.h b/include/linux/ptrace.h > index 4f36431c380b..09744d4113fb 100644 > --- a/include/linux/ptrace.h > +++ b/include/linux/ptrace.h > @@ -87,6 +87,18 @@ extern void exit_ptrace(struct task_struct *tracer, struct list_head *dead); > */ > extern bool ptrace_may_access(struct task_struct *task, unsigned int mode); > > +/** > + * ___ptrace_may_access - variant of ptrace_may_access that can be used > + * between two arbitrary tasks > + * @curr: source task > + * @task: target task > + * @mode: selects type of access and caller credentials > + * > + * Returns true on success, false on denial. > + */ > +extern int ___ptrace_may_access(struct task_struct *curr, struct task_struct *task, > + unsigned int mode); > + > static inline int ptrace_reparented(struct task_struct *child) > { > return !same_thread_group(child->real_parent, child->parent); > diff --git a/kernel/ptrace.c b/kernel/ptrace.c > index 21fec73d45d4..07ff6685ebed 100644 > --- a/kernel/ptrace.c > +++ b/kernel/ptrace.c > @@ -268,9 +268,10 @@ static int ptrace_has_cap(struct user_namespace *ns, unsigned int mode) > } > > /* Returns 0 on success, -errno on denial. */ > -static int __ptrace_may_access(struct task_struct *task, unsigned int mode) > +int ___ptrace_may_access(struct task_struct *curr, struct task_struct *task, > + unsigned int mode) > { > - const struct cred *cred = current_cred(), *tcred; > + const struct cred *cred, *tcred; > struct mm_struct *mm; > kuid_t caller_uid; > kgid_t caller_gid; > @@ -290,9 +291,10 @@ static int __ptrace_may_access(struct task_struct *task, unsigned int mode) > */ > > /* Don't let security modules deny introspection */ > - if (same_thread_group(task, current)) > + if (same_thread_group(task, curr)) > return 0; > rcu_read_lock(); > + cred = __task_cred(curr); > if (mode & PTRACE_MODE_FSCREDS) { > caller_uid = cred->fsuid; > caller_gid = cred->fsgid; > @@ -331,6 +333,11 @@ static int __ptrace_may_access(struct task_struct *task, unsigned int mode) > return security_ptrace_access_check(task, mode); > } > > +static int __ptrace_may_access(struct task_struct *task, unsigned int mode) > +{ > + return ___ptrace_may_access(current, task, mode); > +} > + > bool ptrace_may_access(struct task_struct *task, unsigned int mode) > { > int err; >