Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp6739922ybl; Wed, 15 Jan 2020 09:26:20 -0800 (PST) X-Google-Smtp-Source: APXvYqzzTMbhsMRBU/X4hl7tZHNfmr+njXAuUUqitUah1pC3ldgUpsHjkuWAkvxdIQy7doaWW7XT X-Received: by 2002:aca:6042:: with SMTP id u63mr745488oib.76.1579109180735; Wed, 15 Jan 2020 09:26:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579109180; cv=none; d=google.com; s=arc-20160816; b=VCHIkNVkF4uX8qKhGdJZOGC7uSVWlCCX8W1SDL2TWvtyw9nhfdnrzcl5k3GymPeV5D MFOzxAdcsoWixLkTS6lHf1oet+RZ/uVpD8F+ZNNdjCv1ECk43tiIDpdRP4VV8LmjSF7D vVasi8GtWu/9fmV5k5RC8jOSgZB0f7EI2AQwM2CsI8igV75yncKtRyF2xhyNahUjz1hj A03Uj55FP4y7aUhVtB8MIKHr9yk0GPZUse41rPI3xblNPAA6iRoUCWhO8sbQAvCfGJdw ZXV1RBs4kHRf7BHUDmqY++Wl3S/qwxOwaAosYrCypqvf3B4h01ZsBd2cJiCA6PWBdXeo 9BRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=OMtJ6IXTOGeEA5N0J/5OiCQluwXrMlhmPl6KdZClo/w=; b=rIT8K500NlqnNiVlTe0mzGw+x8WyFGEjfSH9r7nNPlRtN77YQsrdRiR7q1eXBd+aeR f3DcgmevxfPq5S1//uVkNH3hTuvs6+di3/InOzCuDnRVh+gtukHcu0HOPdfUszjSNhyF yt6kMqB4mLjvO9pvZYtlw7ynL/i6xV1kLf8HUF2qMw0yrCuxGHMP5ZpnBemIQfCx/7fI uGSiWM4w8CZWjwDDr+2lZLgkikdT4G9JClfBYDVXioTP7CUhoxtHyRbb8HE74HWRPN95 k+XQryRNrOtqBPVDYko8e0fV+aEMfiCAJk2wkZmtDu39kmrJ7PF1fwhH9I6g4o76VSpO h4rQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l20si11115950otd.292.2020.01.15.09.26.07; Wed, 15 Jan 2020 09:26:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729026AbgAORYx (ORCPT + 99 others); Wed, 15 Jan 2020 12:24:53 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:37170 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726574AbgAORYx (ORCPT ); Wed, 15 Jan 2020 12:24:53 -0500 Received: from ip5f5bd663.dynamic.kabel-deutschland.de ([95.91.214.99] helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1irmPT-0007KX-7w; Wed, 15 Jan 2020 17:24:51 +0000 Date: Wed, 15 Jan 2020 18:24:50 +0100 From: Christian Brauner To: linux-kernel@vger.kernel.org Cc: Serge Hallyn , Jann Horn , Oleg Nesterov , Eric Paris , stable@vger.kernel.org Subject: Re: [PATCH] ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() Message-ID: <20200115172450.y73kkxiggfxrofrh@wittgenstein> References: <20200115171736.16994-1-christian.brauner@ubuntu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200115171736.16994-1-christian.brauner@ubuntu.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 15, 2020 at 06:17:36PM +0100, Christian Brauner wrote: > Commit 69f594a38967 ("ptrace: do not audit capability check when outputing /proc/pid/stat") > introduced the ability to opt out of audit messages for accesses to > various proc files since they are not violations of policy. > While doing so it somehow switched the check from ns_capable() to > has_ns_capability{_noaudit}(). That means it switched from checking the > subjective credentials of the task to using the objective credentials. I > couldn't find the original lkml thread and so I don't know why this switch > was done. But it seems wrong since ptrace_has_cap() is currently only used > in ptrace_may_access(). And it's used to check whether the calling task > (subject) has the CAP_SYS_PTRACE capability in the provided user namespace > to operate on the target task (object). According to the cred.h comments > this would mean the subjective credentials of the calling task need to be > used. > This switches it to use security_capable() because we only call > ptrace_has_cap() in ptrace_may_access() and in there we already have a > stable reference to the calling tasks creds under cred_guard_mutex so > there's no need to go through another series of dereferences and rcu > locking done in ns_capable{_noaudit}(). > > Cc: Serge Hallyn > Cc: Jann Horn > Cc: Oleg Nesterov > Cc: Eric Paris > Cc: stable@vger.kernel.org > Fixes: 69f594a38967 ("ptrace: do not audit capability check when outputing /proc/pid/stat") > Signed-off-by: Christian Brauner > --- > kernel/ptrace.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/kernel/ptrace.c b/kernel/ptrace.c > index cb9ddcc08119..b2fe800cae9a 100644 > --- a/kernel/ptrace.c > +++ b/kernel/ptrace.c > @@ -264,12 +264,14 @@ static int ptrace_check_attach(struct task_struct *child, bool ignore_state) > return ret; > } > > -static int ptrace_has_cap(struct user_namespace *ns, unsigned int mode) > +static int ptrace_has_cap(const struct cred *cred, struct user_namespace *ns, > + unsigned int mode) > { > if (mode & PTRACE_MODE_NOAUDIT) > - return has_ns_capability_noaudit(current, ns, CAP_SYS_PTRACE); > + return security_capable(cred, ns, CAP_SYS_PTRACE, CAP_OPT_NONE); > else > - return has_ns_capability(current, ns, CAP_SYS_PTRACE); > + return security_capable(cred, ns, CAP_SYS_PTRACE, > + CAP_OPT_NOAUDIT); Accidently switched those two lines. I sent a fixed version now! Thanks! Christian