Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1613634pxb; Thu, 4 Feb 2021 18:37:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJxJ1DtfROYgcCnEP+8zVtWNfANawODZM/hVlaFEYgxXjx3+JhJ4TLwKPwdtBD6YLWLRXVbS X-Received: by 2002:a17:906:38c3:: with SMTP id r3mr1984283ejd.193.1612492657044; Thu, 04 Feb 2021 18:37:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612492657; cv=none; d=google.com; s=arc-20160816; b=UuNT/bdEbvvkJBpcYLUQ+Tv4WYDupuVYFJQg8+vydORe3PLs+r+6SuIJWEkl9cIuvE t6z+2AcBC2g4v+lZBG8DYJRyqUUBpr+iZArXgaHbafKIJ05DHdr1KnShA0iC69LebJwt pQn/yd8poS1G6shqAYP3koVkMhm90dykG8c6K7sAK3ccV3JXKgcJ4thWn4IAZ7q6nY/L v61nEZ/IBR4D/Uov0SBZpXTFpyAWS4heOt2lleQS5x7WBIRmhR61jGoUSrjMLimgcVSZ CJQ6kyZ7X/GwZAXkgIWaJciTA8TmROiIrKX3CIXVKjvpy0AmFMJglumP73bPIjn7guVx JNZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:content-transfer-encoding:cc:from:subject :mime-version:message-id:date:sender:dkim-signature; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=MDxDNuSBj+2oCeWYluIt1TocgyBV1IOViYQGgB/u39QR7yQa2b4GEP67q1l6yRxiSR R2Lg75O3SJxMobknpjoAMXF2A5sQJzFeLfFtdjvju8aV/crNvSNDBa9Xkdn3QB5OxS8N tQw/5xbcaEGK0X/QwKhI+XLWgS7oJRaJ78ahjHV7UiAMYbLPaUTHTcLjX2Qagkb/NvPf wlKHY4DjeJ7a2HsXwATYfKhXhelV2HU7DTFeZIGLbknC46TI215xpE7har0Eg+NpzFpu 342yHFmnCZMs8ntguDRd2HxJI3ZWkJt5gytnr78BrzWOomn58DY8IRbViAOaYCs6fE42 8P7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NPnaeEsH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m19si4886706edd.458.2021.02.04.18.37.13; Thu, 04 Feb 2021 18:37:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NPnaeEsH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229981AbhBECYX (ORCPT + 99 others); Thu, 4 Feb 2021 21:24:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38892 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229969AbhBECYS (ORCPT ); Thu, 4 Feb 2021 21:24:18 -0500 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B7EB8C06178B for ; Thu, 4 Feb 2021 18:23:37 -0800 (PST) Received: by mail-qv1-xf49.google.com with SMTP id v1so3798302qvb.2 for ; Thu, 04 Feb 2021 18:23:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:cc :content-transfer-encoding; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=NPnaeEsHxHi/piRE30L1x8OZG9uQMUa5w0+x+UsNeCLDh53QMbkeU5Lgv6AyU09LNL DvZlEMtUnBsxCDBL3yrqJy92tZ8kFjhjM6bzzE7sIcdxQ7PurT0Y5gjLSEt88GT81AYX WXWOItSdEv/zp5NuWxav6asdBkP2pAw/kOD1AnK0PBVvEtmZ5Vwefg6MQI3tsn4OPMdQ plwXe0QwouLzjvGwfsA8yTvslcXQXLi9bh5ko/UbSEtwbYpopaH0W1YUG2ZFACQHPL7l aActAi6eUrI0CpI9j3fYhDfEmO/xw1jFkDq687flA8YUAwa0Ql6pjLhJOgq6C4n0nFdi HETw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :cc:content-transfer-encoding; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=qYU694fXNn2S8ndHvQKdxTv3qxVW5th7weOlwa8eOccIeBLIYoKmizGugb6xf9/KCX 6dgGqYwnonafR3IUxQU0MRxwDQ692wPU22HlycUoYC13c8k4Bbub/TgFn4kmXOtTS2WU W3bpf7+O07l5yBWaW/Hpdy+irqXUg5HTKPoyCEpYXALrgfsrgsc55vfhzYr51Df65Yrz ouhwex8sODqeaNNh/NR/eEfbJI5KwoguEPYrDzWYimOu+zZh4DhP9K8I7r/fF+JN1oCA Cb8UOKgpnJrD3xu09O8SAU7bhWTQgSODhjQtYTP5n65Xz8ly6XqVOWCqGuwxC9LYOklU QT1w== X-Gm-Message-State: AOAM533RiCAXQS1wey8p8wc6BTWxFE60O842LQ+6aMmqKGSQ9Tp/twNX 2rUWGnezWW7oYt2VneSKwbioyXTqE3mP0dPeSQ== Sender: "kaleshsingh via sendgmr" X-Received: from kaleshsingh.c.googlers.com ([fda3:e722:ac3:cc00:14:4d90:c0a8:2145]) (user=kaleshsingh job=sendgmr) by 2002:a05:6214:446:: with SMTP id cc6mr2447707qvb.31.1612491816769; Thu, 04 Feb 2021 18:23:36 -0800 (PST) Date: Fri, 5 Feb 2021 02:23:19 +0000 Message-Id: <20210205022328.481524-1-kaleshsingh@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.30.0.365.g02bc693789-goog Subject: [PATCH v3 1/2] procfs: Allow reading fdinfo with PTRACE_MODE_READ From: Kalesh Singh Cc: jannh@google.com, jeffv@google.com, keescook@chromium.org, surenb@google.com, minchan@kernel.org, hridya@google.com, kernel-team@android.com, Kalesh Singh , Alexey Dobriyan , Jonathan Corbet , Sumit Semwal , "=?UTF-8?q?Christian=20K=C3=B6nig?=" , Andrew Morton , Mauro Carvalho Chehab , Michal Hocko , Alexey Gladkov , Randy Dunlap , Anand K Mistry , "Eric W. Biederman" , Michel Lespinasse , Bernd Edlinger , Andrei Vagin , Yafang Shao , Christian Brauner , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-doc@vger.kernel.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Android captures per-process system memory state when certain low memory events (e.g a foreground app kill) occur, to identify potential memory hoggers. In order to measure how much memory a process actually consumes, it is necessary to include the DMA buffer sizes for that process in the memory accounting. Since the handle to DMA buffers are raw FDs, it is important to be able to identify which processes have FD references to a DMA buffer. Currently, DMA buffer FDs can be accounted using /proc//fd/* and /proc//fdinfo -- both are only readable by the process owner, as follows: 1. Do a readlink on each FD. 2. If the target path begins with "/dmabuf", then the FD is a dmabuf FD. 3. stat the file to get the dmabuf inode number. 4. Read/ proc//fdinfo/, to get the DMA buffer size. Accessing other processes=E2=80=99 fdinfo requires root privileges. This li= mits the use of the interface to debugging environments and is not suitable for production builds. Granting root privileges even to a system process increases the attack surface and is highly undesirable. Since fdinfo doesn't permit reading process memory and manipulating process state, allow accessing fdinfo under PTRACE_MODE_READ_FSCRED. Suggested-by: Jann Horn Signed-off-by: Kalesh Singh --- Changes in v2: - Update patch description fs/proc/base.c | 4 ++-- fs/proc/fd.c | 15 ++++++++++++++- 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/fs/proc/base.c b/fs/proc/base.c index b3422cda2a91..a37f9de7103f 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -3160,7 +3160,7 @@ static const struct pid_entry tgid_base_stuff[] =3D { DIR("task", S_IRUGO|S_IXUGO, proc_task_inode_operations, proc_task_= operations), DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_oper= ations), DIR("map_files", S_IRUSR|S_IXUSR, proc_map_files_inode_operations, proc_= map_files_operations), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdi= nfo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdi= nfo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_op= erations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_op= erations), @@ -3504,7 +3504,7 @@ static const struct inode_operations proc_tid_comm_in= ode_operations =3D { */ static const struct pid_entry tid_base_stuff[] =3D { DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_opera= tions), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdin= fo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdin= fo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_ope= rations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_op= erations), diff --git a/fs/proc/fd.c b/fs/proc/fd.c index cb51763ed554..585e213301f9 100644 --- a/fs/proc/fd.c +++ b/fs/proc/fd.c @@ -6,6 +6,7 @@ #include #include #include +#include #include #include #include @@ -72,6 +73,18 @@ static int seq_show(struct seq_file *m, void *v) =20 static int seq_fdinfo_open(struct inode *inode, struct file *file) { + bool allowed =3D false; + struct task_struct *task =3D get_proc_task(inode); + + if (!task) + return -ESRCH; + + allowed =3D ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); + put_task_struct(task); + + if (!allowed) + return -EACCES; + return single_open(file, seq_show, inode); } =20 @@ -307,7 +320,7 @@ static struct dentry *proc_fdinfo_instantiate(struct de= ntry *dentry, struct proc_inode *ei; struct inode *inode; =20 - inode =3D proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUSR); + inode =3D proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO); if (!inode) return ERR_PTR(-ENOENT); =20 --=20 2.30.0.478.g8a0d178c01-goog