Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1925793imu; Sun, 18 Nov 2018 11:45:43 -0800 (PST) X-Google-Smtp-Source: AJdET5caLItBnzNjSY5dvn0B042GgYAhPu+MQ8oLbOAVUA351JzM3VJcqokJt8PiMnsGQHy5EaWZ X-Received: by 2002:a17:902:a40f:: with SMTP id p15mr19866250plq.286.1542570343867; Sun, 18 Nov 2018 11:45:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542570343; cv=none; d=google.com; s=arc-20160816; b=gZHKu0lyJ176M6NXEvH7qVhhkTmUtTOdOLCPnDLZxF76+ux63Ytin+SVVe9Tk1c8J/ 8UreDbI7Epqu8rp1yvXMKzP/vUo/elR3ZTzl20SPnYx0xuq/SIheb5zsRmBLh8SSfgeT Mmj8Hgb/Uwc06T7P8wUXeuFFdxSjl9HOTSO5KqnoDz6avIXlcucX9JBPMXo4iBbzrMou 8t4h52mAtuwSIeRjstZOirPCmcaLfBk9IIJdQWPvj8gzM1hjyHGFso8rkefB6a4DhGXx x0sLRfkUktdZbArOI6zT0iV8rZYEXU9OamzFQJLr9sd0F3bT4mi2NAIijJ9j3N9UU/hm vkZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature; bh=fXqGRyHsvfgYCK3d5Yjkq/Ne/bQfG4IZk30JddCOavU=; b=Ieo5bXyELvcOqhh6fjDMl2VhzRIQJ+su3Z8vRIzuO16Yg4IR8qxDtuIzcV5ql2iY04 kgJ9wW0+bIIEEHYHY4poBR5qOa438Hrb5EwPp0fTu86aRnAJpxletGHJZk1gFnrH4xMw S3IXHrB4Ws5/Qe/UdJtW0ktKGHu/3IqO7mAGMIrdGYDsER4A0KlNmqRSt9g6DL+EMAm4 At+2pVdALwQ+xTH5DVyAAzu3maha02zpDIx6VUSpJppRJSUmdndi9UvW6/A53zRdG/Jr TEELx9Qqw8LKXLAjJsckdYsbPSNVSzZIr0zKp2R3GbEbPErtKEHd8hEadWitRWsYculP 7vnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=X3Im4XHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s36si79255pld.46.2018.11.18.11.45.29; Sun, 18 Nov 2018 11:45:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=X3Im4XHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726959AbeKSGFb (ORCPT + 99 others); Mon, 19 Nov 2018 01:05:31 -0500 Received: from mail-vs1-f68.google.com ([209.85.217.68]:41234 "EHLO mail-vs1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725921AbeKSGFb (ORCPT ); Mon, 19 Nov 2018 01:05:31 -0500 Received: by mail-vs1-f68.google.com with SMTP id t17so16561473vsc.8 for ; Sun, 18 Nov 2018 11:44:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=fXqGRyHsvfgYCK3d5Yjkq/Ne/bQfG4IZk30JddCOavU=; b=X3Im4XHoBWuBykgR/edcU9qLZ6g9e5ae3ZWNF0HptycD9ZjGoIQ6VjG+HRdAoqddjO mTd0aj6xG5v1Dx38bNJWiHHwnl2WKqftO3/sKaBLAfSRFP1gQQ0R9OggDt3nuEwCsilD 8r6jyfX6xsXWFmOi3j9A/otLR4NNS5CN6O8pUMX/ObsXDqheLtxCvYmjHChYaS3jxx/d H97FROqxLOiXvh838KBaIigdN9cnHzcTozHWs71kbLB3lyrtuDJ068v7ghQ15j7apLKt HMPUOT3hooOuBLpz8RKNo0LW/yCcLd9GAw5TB5jmSLkFWWJZvo/4L290CLTvG8N5rsGM KYjQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=fXqGRyHsvfgYCK3d5Yjkq/Ne/bQfG4IZk30JddCOavU=; b=JSMJJ7oC7/uJFmrsi6FTXpqUDuCHoLi0lLdVrwfZow5P+KYVuBZZYbJXkqsRkfN/bh 1C7SNhzPWd2l/YIlpK3OF6sxbB/AJRbVAMm8eBNfvGECEt0zr9bG2GibGZ3YzJRiI+iD F4+0uBLBvj+a5lzRs6LTUwW+qqhRgg5+hPUTla5TWg7tVg7qi/A4oEgjF3oqfn39e0AD Z0Rc+YHwHIbS2OW6law5akN2NaDOBB6IUQOFOUclvHKGkHNtHQFQ6qSY2+8sYmnwbt1X Ei46XSk6aD88e7TyVZ4e81/8Hm9ilmBmSewVOaSFpsph4CjJK59RAO7aswA/TspQs69P 7nTA== X-Gm-Message-State: AGRZ1gLWDobDFcZFexcBSfsUGSlk85zDxkoaOzUnyOcu7kTaiXY5tCGB S9teFiOIksNFel8KoPOrCatuq5gdh+Rjiex825GNCQ== X-Received: by 2002:a67:b44:: with SMTP id 65mr7908390vsl.77.1542570260255; Sun, 18 Nov 2018 11:44:20 -0800 (PST) MIME-Version: 1.0 Received: by 2002:a67:f48d:0:0:0:0:0 with HTTP; Sun, 18 Nov 2018 11:44:19 -0800 (PST) In-Reply-To: <20181118190504.ixglsqbn6mxkcdzu@yavin> References: <20181118190504.ixglsqbn6mxkcdzu@yavin> From: Daniel Colascione Date: Sun, 18 Nov 2018 11:44:19 -0800 Message-ID: Subject: Re: [PATCH] proc: allow killing processes via file descriptors To: Aleksa Sarai Cc: Andy Lutomirski , Randy Dunlap , Christian Brauner , "Eric W. Biederman" , LKML , "Serge E. Hallyn" , Jann Horn , Andrew Morton , Oleg Nesterov , Al Viro , Linux FS Devel , Linux API , Tim Murray , Kees Cook , Jan Engelhardt Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Nov 18, 2018 at 11:05 AM, Aleksa Sarai wrote: > On 2018-11-18, Daniel Colascione wrote: >> > Here's my point: if we're really going to make a new API to manipulate >> > processes by their fd, I think we should have at least a decent idea >> > of how that API will get extended in the future. Right now, we have >> > an extremely awkward situation where opening an fd in /proc requires >> > certain capabilities or uids, and using those fds often also checks >> > current's capabilities, and the target process may have changed its >> > own security context, including gaining privilege via SUID, SGID, or >> > LSM transition rules in the mean time. This has been a huge source of >> > security bugs. It would be nice to have a model for future APIs that >> > avoids these problems. >> > >> > And I didn't say in my proposal that a process's identity should >> > fundamentally change when it calls execve(). I'm suggesting that >> > certain operations that could cause a process to gain privilege or >> > otherwise require greater permission to introspect (mainly execve) >> > could be handled by invalidating the new process management fds. >> > Sure, if init re-execs itself, it's still PID 1, but that doesn't >> > necessarily mean that: >> > >> > fd = process_open_management_fd(1); >> > [init reexecs] >> > process_do_something(fd); >> > >> > needs to work. >> >> PID 1 is a bad example here, because it doesn't get recycled. Other >> PIDs do. The snippet you gave *does* need to work, in general, because >> if exec invalidates the handle, and you need to reopen by PID to >> re-establish your right to do something with the process, that process >> may in fact have died between the invalidation and your reopen, and >> your reopened FD may refer to some other random process. > > I imagine the error would be -EPERM rather than -ESRCH in this case, > which would be incredibly trivial for userspace to differentiate > between. Why would userspace necessarily see EPERM? The PID might get recycled into a different random process that the caller has the ability to affect. > If you wish to re-open the path that is also trivial by > re-opening through /proc/self/fd/$fd -- which will re-do any permission > checks and will guarantee that you are re-opening the same 'struct file' > and thus the same 'struct pid'. When you reopen via /proc/self/fd, you get a new struct file referencing the existing inode, not the same struct file. A new reference to the old struct file would just be dup. Anyway: what other API requires, for correct operation, occasional reopening through /proc/self/fd? It's cumbersome, and it doesn't add anything. If we invalidate process handles on execve, and processes are legally allowed to re-exec themselves for arbitrary reasons at any time, that's tantamount to saying that handles might become invalid at any time and that all callers must be prepared to go through the reopen-and-retry path before any operation. Why are we making them do that? So that a process can have an open FD that represents a process-operation capability? Which capability does the open FD represent? I think when you and Andy must be talking about is an API that looks like this: int open_process_operation_handle(int procfs_dirfd, int capability_bitmask) capability_bitmask would have bits like PROCESS_CAPABILITY_KILL --- send a signal PROCESS_CAPABILITY_PTRACE --- attach to a process PROCESS_CAPABILITY_READ_EXIT_STATUS --- what it says on the tin PROCESS_CAPABILITY_READ_CMDLINE --- etc. Then you'd have system calls like int process_kill(int process_capability_fd, int signo, const union sigval data) int process_ptrace_attach(int process_capability_fd) int process_wait_for_exit(int process_capability_fd, siginfo_t* exit_info) that worked on these capability bits. If a process execs or does something else to change its security capabilities, operations on these capability FDs would fail with ESTALE or something and callers would have to re-acquire their capabilities. This approach works fine. It has some nice theoretical properties, and could allow for things like nicer privilege separation for debuggers. I wouldn't mind something like this getting into the kernel. I just don't think this model is necessary right now. I want a small change from what we have today, one likely to actually make it into the tree. And bypassing the capability FDs and just allowing callers to operate directly on process *identity* FDs, using privileges in effect at the time of all, is at least no worse than what we have now. That is, I'm proposing an API that looks like this: int process_kill(int procfs_dfd, int signo, const union sigval value) If, later, process_kill were to *also* accept process-capability FDs, nothing would break. >> The only way around this problem is to have two separate FDs --- one >> to represent process identity, which *must* be continuous across >> execve, and the other to represent some specific capability, some >> ability to do something to that process. It's reasonable to invalidate >> capability after execve, but it's not reasonable to invalidate >> identity. In concrete terms, I don't see a big advantage to this >> separation, and I think a single identity FD combined with >> per-operation capability checks is sufficient. And much simpler. > > I think that the error separation above would trivially allow user-space > to know whether the identity or capability of a process being monitored > has changed. > > Currently, all operations on a '/proc/$pid' which you've previously > opened and has died will give you -ESRCH. Not the case. Zombies have died, but profs operations work fine on zombies. >> > Similarly, it seems like >> > it's probably safe to be able to open an fd that lets you watch the >> > exit status of a process, have the process call setresuid(), and still >> > see the exit status. >> >> Is it? That's an open question. > > Well, if we consider wait4(2) it seems that this is already the case. > If you fork+exec a setuid binary you can definitely see its exit code. Only if you're the parent. Otherwise, you can't see the process exit status unless you pass a ptrace access check and consult /proc/pid/stat after the process dies, but before the zombie disappears. Random unrelated and unprivileged processes can't see exit statuses from distant parts of the system. >> > My POLLERR hack, aside from being ugly, >> > avoids this particular issue because it merely lets you wait for >> > something you already could have observed using readdir(). >> >> Yes. I mentioned this same issue-punting as the motivation behind >> exithand, initially, just reading EOF on exit. > > One question I have about EOF-on-exit is that if we wish to extend it to > allow providing the exit status (which is something we discussed in the > original thread), how will multiple-readers be handled in such a > scenario? > Would we be storing the exit status or siginfo in the > equivalent of a locked memfd? Yes, that's what I have in mind. A siginfo_t is small enough that we could just store it as a blob allocated off the procfs inode or something like that without bothering with a shmfs file. You'd be able to read(2) the exit status as many times as you wanted.