Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2278928pxb; Fri, 5 Feb 2021 13:37:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyTA6yOIrPScAKyQ7hxh8GamlTgxOXhDJGop6onhQ6IleqkFVPot5qnTEcSlVttwp/pU4cO X-Received: by 2002:a17:906:607:: with SMTP id s7mr5849986ejb.301.1612561077949; Fri, 05 Feb 2021 13:37:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612561077; cv=none; d=google.com; s=arc-20160816; b=G3Ynvp7IAJapH6koZIBuroA9IDcllDI2pajm19quz2Ugq9UA6iQji5RG47+/8wSLf1 m3+N7JWpi9bOUZ6xZ7yTbumKLAIcTthO023iUbJqZagbDv/PG65hLBx1nvA+zg97dqDu W4DRAH6tXeLQ27wwLKIJrZbjQlutN+P3Ge7kEmM5VY7lOaR2RYjOTvF9ivYVwwDayI6a srcoP1rm0VoSVp+R9UQG3TmQlbINvg8c9k8DiT7gJOQrrtWUZvrvpDSQEhsh+NZm4q/5 6+a8ZEXvMFsvD/e/COAdswKH3LOHGC2dCv4IPJofHxA/EFgdFCfvP8dLliDw+c1F+Q8q 4EjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:content-transfer-encoding:cc:from:subject :mime-version:message-id:date:sender:dkim-signature; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=kYIdgIVVrkOq4h6Kh+8/U8vGW5h6Ga0qyvKSBCu7zPJTOeqrT0R1lUDVJWxYV9di/N 1I6/NVUDoHyyX6aRfRoZcU7RsEulQ4X1cVHfWgKQ/hb+68zDwrNUDNE3Mr8BTjgMUgzy 60y2Dqrh5yZXyPkoqlsRZN1ztNstw2wKUmtEEQbI0A1+Y+zuexoCs0SAy7A6Fn7RzZYM UkbOxQPfy72THzbYHq65oPzjte5Qc/sA51bpxvSzCECMV1/zpTRcIiujYzjjsZxiLtSR 1VwtEcT8mO0b0cbiMhVFy3gbn015iucLoBYvXNVjjFI+5fdZMtlKxicaisZqJb70IzHn eEJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Do3cLKKg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c4si1956170eds.533.2021.02.05.13.37.33; Fri, 05 Feb 2021 13:37:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Do3cLKKg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230262AbhBEVfh (ORCPT + 99 others); Fri, 5 Feb 2021 16:35:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57058 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229638AbhBEVev (ORCPT ); Fri, 5 Feb 2021 16:34:51 -0500 Received: from mail-qk1-x74a.google.com (mail-qk1-x74a.google.com [IPv6:2607:f8b0:4864:20::74a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DF167C061788 for ; Fri, 5 Feb 2021 13:33:58 -0800 (PST) Received: by mail-qk1-x74a.google.com with SMTP id r190so6978215qkf.19 for ; Fri, 05 Feb 2021 13:33:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:cc :content-transfer-encoding; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=Do3cLKKgATj9Sj1wczzer7FsQYo2BGJLV+dlolkVMaamGTbvNtGFsx8B9cjDusaoJ6 PH//GMgsuQfTvFJGb504gwHqFYmglx5t8ajCSi0wjHfPg87LkbKyWXkwy6n6pjLVT7L6 obdgNsN/V1Pbj2Yfog3ATINTeISlKX2QmY91sGRAEa+7Ut5frVD33da8olSv64KKgmTY 1hfq4LWBjd1MWAK9SODnWt6hywEnmqIQ9gB8knT+0X0lqaJGvPZa3hK48Wot+TTQB7uC NQhQRopKwh3fC+Dq4ymwIfzENFP3dBEcffQ9JT2loQ6otxhuzTDLJkfWRqu59R79ZTtA e7IQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :cc:content-transfer-encoding; bh=w382r+buQ4Tx8FdN/ryZgjV6D4PrxeZkE7hCNPLCCTk=; b=m3Eic7f0+xbQ5d9jxdFilexZhX5AAWNwBQgf5pePph0bYJK91gvvfahdolF7hQbh4D U8xuNrkV6xEXlsYwqW080ErznOAhMkENcZr4FwR6E6slH46cx+Vg3zIVy8dV+7MjFdyf PO9mMhD6QvKkL1wlZG5h41INlKxAkUr0nDfbx3aLdpz/BmKRnxBG59Bhx5cTjx3p5/ZG z7kIFvjN3DBpiY8ZFNpljib62yfLmu7+Xer28eH0LgXvq4Me/a0CHJKQJUKWcYj7lsXJ UFPTHMVgMMoVdpn5ev6oMYAEZr6L4o0q702cFiEAVn8tEBBOoCe0rUlYThzOUkt0uOMA V3EA== X-Gm-Message-State: AOAM530o9a1mLzo6d/yTUMiZfNUsDXvcw1YW7XDrGgSd07lklFaqzzSx sLwjCWuMxtwBqkmYN9xcwj9ybL3au9mhlw4RwA== Sender: "kaleshsingh via sendgmr" X-Received: from kaleshsingh.c.googlers.com ([fda3:e722:ac3:10:14:4d90:c0a8:2145]) (user=kaleshsingh job=sendgmr) by 2002:a0c:8365:: with SMTP id j92mr6362202qva.19.1612560837960; Fri, 05 Feb 2021 13:33:57 -0800 (PST) Date: Fri, 5 Feb 2021 21:33:43 +0000 Message-Id: <20210205213353.669122-1-kaleshsingh@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.30.0.478.g8a0d178c01-goog Subject: [PATCH v4 1/2] procfs: Allow reading fdinfo with PTRACE_MODE_READ From: Kalesh Singh Cc: jannh@google.com, jeffv@google.com, keescook@chromium.org, surenb@google.com, minchan@kernel.org, hridya@google.com, rdunlap@infradead.org, christian.koenig@amd.com, kernel-team@android.com, Kalesh Singh , Alexey Dobriyan , Jonathan Corbet , Mauro Carvalho Chehab , Andrew Morton , Michal Hocko , Alexey Gladkov , NeilBrown , Szabolcs Nagy , "Eric W. Biederman" , Michel Lespinasse , Bernd Edlinger , Andrei Vagin , Yafang Shao , Christian Brauner , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-doc@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Android captures per-process system memory state when certain low memory events (e.g a foreground app kill) occur, to identify potential memory hoggers. In order to measure how much memory a process actually consumes, it is necessary to include the DMA buffer sizes for that process in the memory accounting. Since the handle to DMA buffers are raw FDs, it is important to be able to identify which processes have FD references to a DMA buffer. Currently, DMA buffer FDs can be accounted using /proc//fd/* and /proc//fdinfo -- both are only readable by the process owner, as follows: 1. Do a readlink on each FD. 2. If the target path begins with "/dmabuf", then the FD is a dmabuf FD. 3. stat the file to get the dmabuf inode number. 4. Read/ proc//fdinfo/, to get the DMA buffer size. Accessing other processes=E2=80=99 fdinfo requires root privileges. This li= mits the use of the interface to debugging environments and is not suitable for production builds. Granting root privileges even to a system process increases the attack surface and is highly undesirable. Since fdinfo doesn't permit reading process memory and manipulating process state, allow accessing fdinfo under PTRACE_MODE_READ_FSCRED. Suggested-by: Jann Horn Signed-off-by: Kalesh Singh --- Changes in v2: - Update patch description fs/proc/base.c | 4 ++-- fs/proc/fd.c | 15 ++++++++++++++- 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/fs/proc/base.c b/fs/proc/base.c index b3422cda2a91..a37f9de7103f 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -3160,7 +3160,7 @@ static const struct pid_entry tgid_base_stuff[] =3D { DIR("task", S_IRUGO|S_IXUGO, proc_task_inode_operations, proc_task_= operations), DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_oper= ations), DIR("map_files", S_IRUSR|S_IXUSR, proc_map_files_inode_operations, proc_= map_files_operations), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdi= nfo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdi= nfo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_op= erations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_op= erations), @@ -3504,7 +3504,7 @@ static const struct inode_operations proc_tid_comm_in= ode_operations =3D { */ static const struct pid_entry tid_base_stuff[] =3D { DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_opera= tions), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdin= fo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdin= fo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_ope= rations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_op= erations), diff --git a/fs/proc/fd.c b/fs/proc/fd.c index cb51763ed554..585e213301f9 100644 --- a/fs/proc/fd.c +++ b/fs/proc/fd.c @@ -6,6 +6,7 @@ #include #include #include +#include #include #include #include @@ -72,6 +73,18 @@ static int seq_show(struct seq_file *m, void *v) =20 static int seq_fdinfo_open(struct inode *inode, struct file *file) { + bool allowed =3D false; + struct task_struct *task =3D get_proc_task(inode); + + if (!task) + return -ESRCH; + + allowed =3D ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); + put_task_struct(task); + + if (!allowed) + return -EACCES; + return single_open(file, seq_show, inode); } =20 @@ -307,7 +320,7 @@ static struct dentry *proc_fdinfo_instantiate(struct de= ntry *dentry, struct proc_inode *ei; struct inode *inode; =20 - inode =3D proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUSR); + inode =3D proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO); if (!inode) return ERR_PTR(-ENOENT); =20 --=20 2.30.0.478.g8a0d178c01-goog