Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2245450imm; Thu, 27 Sep 2018 09:36:56 -0700 (PDT) X-Google-Smtp-Source: ACcGV61ENUHgfUhZg67aZZIwSYV/GztpECMFMF6XJcF80r9lNSlHsu3Uee1sMKCXLDEbhrFhLtMs X-Received: by 2002:a63:4950:: with SMTP id y16-v6mr1830214pgk.32.1538066216585; Thu, 27 Sep 2018 09:36:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538066216; cv=none; d=google.com; s=arc-20160816; b=FBFw5cAvNLi9vRjKso1Xc8AZuWnDMKrqlw5XmDhpeg3Zwi6IKtMCobDatHZsFz0pQ8 8m0V2OOuhtCjYcAzDGR+vCHY2mX2fs4vp7ZW3QlRxmil9BsjDmq9d7CcXJeSJh/U8Nyo 9eEk936eeZIo+Y0SRc8YVsz2c/phU4vl3T/FvtP65T/R7oMAe3Ha1aE+65A1H5gMisrd D5RhgIoiOTXbObSpvRb+/IopZ2Qqp1CoqQc+EFXY8bWqFw/xVIogXoBwI7Qi2aQYRLga wMneLVo42q/hdJ+xxUmjHGvZ7vFII+mmmZ77dY524VSN/saofvVEIgpj823zrZXbpsMM RAWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=fWk6RPKFJis6w3MZFPx/DZVADSgeMqpr+KynDO3uqU0=; b=WR0v5T+kYZF8i9U/h7I63YGj1mLfoPEq9oB5n8T53crkdLppRWil1zMO81mEO7n45n miQdxtvDv0SqoBEP4pmhAWnTDwo4OWkFuA11y05dI63Fnnrx5TeWcNtAsDVoygVbcJ4g SpVVfJ09T8ItSJF5h2ghLd3O9aTYL9h041riqOwN4ZO2aA2l6z0bbymTVm4dWX0D5of0 a1dFdiT8xncCEZVE6hIoOrkBz0Zk9cV+FyveBlBXU8sCYrrQuV/IQ2zHuHuo8pSoep5d vkZoaTJyy5vYBU5QUdle0fiOvWZ0FLA4UQxs7QJV9SH29GHUr9thgB2HpckmlrLidy1n 1pyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tycho-ws.20150623.gappssmtp.com header.s=20150623 header.b=ZFz37cjf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y20-v6si2368187plr.110.2018.09.27.09.36.32; Thu, 27 Sep 2018 09:36:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@tycho-ws.20150623.gappssmtp.com header.s=20150623 header.b=ZFz37cjf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728415AbeI0Wxq (ORCPT + 99 others); Thu, 27 Sep 2018 18:53:46 -0400 Received: from mail-pf1-f196.google.com ([209.85.210.196]:40361 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728213AbeI0Wxq (ORCPT ); Thu, 27 Sep 2018 18:53:46 -0400 Received: by mail-pf1-f196.google.com with SMTP id s5-v6so2286517pfj.7 for ; Thu, 27 Sep 2018 09:34:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tycho-ws.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=fWk6RPKFJis6w3MZFPx/DZVADSgeMqpr+KynDO3uqU0=; b=ZFz37cjfQeLONxgUmndzfFs0+2vep1QQzwQ+v8JWBWTq+V1mlWgFKqpHo7+liKvXZ6 3/JVmCnjaUkg7Nida6ZGfUUmzy/jRbUMpoycFGgfUGAuI2wpsjdMRJNrO23WkptbQLlQ Z3SRNtxPEEodOUQiixrSoqMp/vS3RmrBsAlZOnY7Ux5GjLWBqszc+mXeeewbq4e9koCi Se+5ze9XtI+zNZtUs7iBG/ub/hIwCG6STBeC6EU2g6BX6lWNRPziD1IeVUlW7JMCOVWl 4qiz0FK+2txEcU2cDuNZ+scJYPX3xiG7lhqH6IH23X+xmOfkJ/6N3ygkrz0URAAxW/3W f2KA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=fWk6RPKFJis6w3MZFPx/DZVADSgeMqpr+KynDO3uqU0=; b=L9bpVNpojJQv8pv+z3xSo3S6dv13eDGmd/n3r++cy8uT/D6ja0iXlWs7WZaTdHJKw8 sLgTumZ+xg1SBZCnBS/VdzsmYwyYvD3kwAOV7G/xiSOMhQGrgKQnxrWMySyYK3wqba4Q Pk/78DUIBzGmHK9EwRBZJVByondV+Ir1wN2VDQCxor55zSXCDA9Y3Og6BuFjse2DTm6r 0ZMX5sq94oMXLyBKAM6DU3Jfuh4WRJFMEHvuzOuuVv9QfSkAr2vWzpxWZhXLXv2WW3rj ezCtv1tueGJMlsS/+dvgp9JpoXx2qlYGGkvv5a9v4DM7Iip1dqK9d6ds8PNOEBa+Kpg+ Myjw== X-Gm-Message-State: ABuFfoj6WPLdEXwQdBAH6/Qnwjp8xBGlCar+QZx63nGpZKmzyeVIP4WV dqhHQTigDf1SUDWSdITzg17/kw== X-Received: by 2002:a65:5545:: with SMTP id t5-v6mr10995186pgr.157.1538066080913; Thu, 27 Sep 2018 09:34:40 -0700 (PDT) Received: from cisco.cisco.com ([128.107.241.178]) by smtp.gmail.com with ESMTPSA id p7-v6sm4157226pfb.101.2018.09.27.09.34.38 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 27 Sep 2018 09:34:39 -0700 (PDT) Date: Thu, 27 Sep 2018 10:34:37 -0600 From: Tycho Andersen To: Jann Horn Cc: Kees Cook , kernel list , containers@lists.linux-foundation.org, Linux API , Andy Lutomirski , Oleg Nesterov , "Eric W. Biederman" , "Serge E. Hallyn" , Christian Brauner , Tyler Hicks , suda.akihiro@lab.ntt.co.jp, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace Message-ID: <20180927163437.GA30761@cisco.cisco.com> References: <20180927151119.9989-1-tycho@tycho.ws> <20180927151119.9989-4-tycho@tycho.ws> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 27, 2018 at 06:20:23PM +0200, Jann Horn wrote: > On Thu, Sep 27, 2018 at 5:11 PM Tycho Andersen wrote: > > As an alternative to SECCOMP_FILTER_FLAG_GET_LISTENER, perhaps a ptrace() > > version which can acquire filters is useful. There are at least two reasons > > this is preferable, even though it uses ptrace: > > > > 1. You can control tasks that aren't cooperating with you > > 2. You can control tasks whose filters block sendmsg() and socket(); if the > > task installs a filter which blocks these calls, there's no way with > > SECCOMP_FILTER_FLAG_GET_LISTENER to get the fd out to the privileged task. > > > > v2: fix a bug where listener mode was not unset when an unused fd was not > > available > > v3: fix refcounting bug (Oleg) > > v4: * change the listener's fd flags to be 0 > > * rename GET_LISTENER to NEW_LISTENER (Matthew) > > v5: * add capable(CAP_SYS_ADMIN) requirement > > v7: * point the new listener at the right filter (Jann) > > > > Signed-off-by: Tycho Andersen > > CC: Kees Cook > > CC: Andy Lutomirski > > CC: Oleg Nesterov > > CC: Eric W. Biederman > > CC: "Serge E. Hallyn" > > CC: Christian Brauner > > CC: Tyler Hicks > > CC: Akihiro Suda > > If you address the two nits below, you can add: > Reviewed-by: Jann Horn Thanks! > > include/linux/seccomp.h | 7 ++ > > include/uapi/linux/ptrace.h | 2 + > > kernel/ptrace.c | 4 ++ > > kernel/seccomp.c | 31 +++++++++ > > tools/testing/selftests/seccomp/seccomp_bpf.c | 68 +++++++++++++++++++ > > 5 files changed, 112 insertions(+) > > > > diff --git a/include/linux/seccomp.h b/include/linux/seccomp.h > > index 017444b5efed..234c61b37405 100644 > > --- a/include/linux/seccomp.h > > +++ b/include/linux/seccomp.h > > @@ -83,6 +83,8 @@ static inline int seccomp_mode(struct seccomp *s) > > #ifdef CONFIG_SECCOMP_FILTER > > extern void put_seccomp_filter(struct task_struct *tsk); > > extern void get_seccomp_filter(struct task_struct *tsk); > > +extern long seccomp_new_listener(struct task_struct *task, > > + unsigned long filter_off); > > Nit: Sorry, I only noticed this just now, but this should have return > type int, not long. ptrace_request() returns an int, and an fd is also > normally represented as an int, not a long. Ugh, I could have sworn I checked this. In particular because the other seccomp code that's called from ptrace returns a long too :) I'll fix that for the next version, and send a different patch for the other two. > > #else /* CONFIG_SECCOMP_FILTER */ > > static inline void put_seccomp_filter(struct task_struct *tsk) > > { > > @@ -92,6 +94,11 @@ static inline void get_seccomp_filter(struct task_struct *tsk) > > { > > return; > > } > > +static inline long seccomp_new_listener(struct task_struct *task, > > + unsigned long filter_off) > > +{ > > + return -EINVAL; > > +} > > #endif /* CONFIG_SECCOMP_FILTER */ > > > > #if defined(CONFIG_SECCOMP_FILTER) && defined(CONFIG_CHECKPOINT_RESTORE) > > diff --git a/include/uapi/linux/ptrace.h b/include/uapi/linux/ptrace.h > > index d5a1b8a492b9..e80ecb1bd427 100644 > > --- a/include/uapi/linux/ptrace.h > > +++ b/include/uapi/linux/ptrace.h > > @@ -73,6 +73,8 @@ struct seccomp_metadata { > > __u64 flags; /* Output: filter's flags */ > > }; > > > > +#define PTRACE_SECCOMP_NEW_LISTENER 0x420e > > + > > /* Read signals from a shared (process wide) queue */ > > #define PTRACE_PEEKSIGINFO_SHARED (1 << 0) > > > > diff --git a/kernel/ptrace.c b/kernel/ptrace.c > > index 21fec73d45d4..289960ac181b 100644 > > --- a/kernel/ptrace.c > > +++ b/kernel/ptrace.c > > @@ -1096,6 +1096,10 @@ int ptrace_request(struct task_struct *child, long request, > > ret = seccomp_get_metadata(child, addr, datavp); > > break; > > > > + case PTRACE_SECCOMP_NEW_LISTENER: > > + ret = seccomp_new_listener(child, addr); > > + break; > > + > > default: > > break; > > } > > diff --git a/kernel/seccomp.c b/kernel/seccomp.c > > index 44a31ac8373a..17685803a2af 100644 > > --- a/kernel/seccomp.c > > +++ b/kernel/seccomp.c > > @@ -1777,4 +1777,35 @@ static struct file *init_listener(struct task_struct *task, > > > > return ret; > > } > > + > > +long seccomp_new_listener(struct task_struct *task, > > + unsigned long filter_off) > > +{ > > + struct seccomp_filter *filter; > > + struct file *listener; > > + int fd; > > + > > + if (!capable(CAP_SYS_ADMIN)) > > + return -EACCES; > > + > > + filter = get_nth_filter(task, filter_off); > > + if (IS_ERR(filter)) > > + return PTR_ERR(filter); > > + > > + fd = get_unused_fd_flags(0); > > s/0/O_CLOEXEC/ ? If userspace needs a non-cloexec fd, userspace can > easily unset O_CLOEXEC; but the reverse isn't true, because it'd be > racy. Sure, will do. Tycho