Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4211780pxb; Mon, 8 Feb 2021 10:28:44 -0800 (PST) X-Google-Smtp-Source: ABdhPJy/GZyrBnRTFnfeKc7ZnoZMCiQHXoToaHZlfIXHvJkUR2Gvhzyy3lPYNZZarToRRk0hW0BV X-Received: by 2002:a17:906:7d09:: with SMTP id u9mr17562084ejo.380.1612808924294; Mon, 08 Feb 2021 10:28:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612808924; cv=none; d=google.com; s=arc-20160816; b=qvsVspVoOZqj11CLyqDax92rtFsUvhjrRIuc4fzZYzarRn0O7rBEyuLLJw3rtQrlxQ 4rjEvKpKkAyhEvFGEiI/13gLNMXrTIxHd0/IZbLah7BstgVYRpYQ57J7dFsiHI31n39r fPBQi+YuoFZFQG3sRBkOYw8Fo3h9fck3RDySX25X/QwfTLOE0FLw6mXpGhLNwa7/FO0T vgCWTaFcv4YOQABBSauje1+LSI2xdtPmPRA/Hk8I7bLZmZRJv8Ehk4vxzY0SM4MPDe8F hTKjtkjVl9TkrvoAbj2o9Ejf8Nr4wiZrfWNMDvddxU14nv3m9rNODhum1ji4at/2z+HB uM0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:cc:from:subject:mime-version:message-id:date :sender:dkim-signature; bh=KABW1PbKP87UHlmwOVcrjPZPD/KiH4IFW6HwyHI8HLw=; b=WZoLGVfOtAwn+XQREbIhirSzl5O8opF7ufwWXeb5D9C2c5nOkHEl0Oe1cqTNyYWhEl vZhhD0spIcQVLtdYId36fxE4bgvS6aGLs1FQHm6C94MExQmVMPfNXKGQ5rnDBg3dAYS/ EHJBZ5SWURoXZsK3z/pT+bgHkqIeLGYuwNBfWeKVOIhnMvn9drngCf6A2TkiwoG8/vMp mseZmTwfjooLrcv5tsBVhiWaGtXg4jPhfTdsB8+fqMKY9gD13wNUITnwFG8sAlSIiFX6 HgzstsWAQnd4Bj8hP14vRpAfawGY0qS77dH/f1W/VvAttil8g+I/EoAOh4UUw5u2HntX 6X6g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=k+plAvQW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q8si6253938edi.249.2021.02.08.10.28.20; Mon, 08 Feb 2021 10:28:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=k+plAvQW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235656AbhBHS1r (ORCPT + 99 others); Mon, 8 Feb 2021 13:27:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60920 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234209AbhBHPx7 (ORCPT ); Mon, 8 Feb 2021 10:53:59 -0500 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4619AC061788 for ; Mon, 8 Feb 2021 07:53:19 -0800 (PST) Received: by mail-yb1-xb4a.google.com with SMTP id i2so17475669ybl.16 for ; Mon, 08 Feb 2021 07:53:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:cc; bh=KABW1PbKP87UHlmwOVcrjPZPD/KiH4IFW6HwyHI8HLw=; b=k+plAvQWKUQQEFSYtdDrmR64LjfOFfyNvE5bQyLeuXXk0gQM9M1YLhI+Kpb8Pq6RRy xXUgZ8Lu748qxXqRshn9BfzpFkBuZqYWwc0HB+CQPVijF0hLdpKZa0Wx4BE7Cq3qKTcG 4YemrGBQUUzxrqVLCDIK+5YyUj35ExFZfnKSA5iVF/fkayXaj4lu7prTK/0JiyDIhICI fXnLZV8WgGU72cjZral6rTKmmKeGcLVviG4fVVZG1/XbYWgaMoD+guk+XrCXEOwOG7++ Q2YwHsK7pUuG96I5oZHtxrbJLTTP4zgpIcc4M/9Rss6yk5IY9M17KM/eqzugs31WXzmT 5VjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :cc; bh=KABW1PbKP87UHlmwOVcrjPZPD/KiH4IFW6HwyHI8HLw=; b=hoS/OQVkzp0NLFmEcykVuoFfsduDe+999WyO1NT994Jnp/33YrRnPjS9IM/bGReyG5 +3jN7pMeQ8W+zFg48qcJ+lbDHf/Y35mK+3bN37dn5I/avOPGx7TqW+xGZHjjxAwFEPVV fdWzb8HlmkDY5clYGaJozd/m/PdqEdFN23PV/HzNrAyqlIkJk4oGM0d5ufFALqp6tBFl xjpO3XEP48vCr8JPuH3NU7UP3cTpTwTfog0/VC1dOrynmwWf6DNniKlmYRFReEshiHiw dCxWip/RZWmBSALKri8PQnCfwJgaczAYoy/QXQyL6uOLWzIhIc0uGCKfofYy0TwkBpVL WloQ== X-Gm-Message-State: AOAM531eHk+OHo7MOvWZe15f/e7IOO5bAi6Xf4YRK9gUUvPw19hKhc90 pTscc1WwPnftR7tsy2NL+o/y+ijtGHWQ/nDN7g== Sender: "kaleshsingh via sendgmr" X-Received: from kaleshsingh.c.googlers.com ([fda3:e722:ac3:10:14:4d90:c0a8:2145]) (user=kaleshsingh job=sendgmr) by 2002:a25:a267:: with SMTP id b94mr25868498ybi.218.1612799598492; Mon, 08 Feb 2021 07:53:18 -0800 (PST) Date: Mon, 8 Feb 2021 15:53:06 +0000 Message-Id: <20210208155315.1367371-1-kaleshsingh@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.30.0.478.g8a0d178c01-goog Subject: [PATCH v6 1/2] procfs: Allow reading fdinfo with PTRACE_MODE_READ From: Kalesh Singh Cc: jannh@google.com, jeffv@google.com, keescook@chromium.org, surenb@google.com, minchan@kernel.org, hridya@google.com, rdunlap@infradead.org, christian.koenig@amd.com, willy@infradead.org, kernel-team@android.com, Kalesh Singh , Alexey Dobriyan , Jonathan Corbet , Mauro Carvalho Chehab , Andrew Morton , Michal Hocko , Alexey Gladkov , NeilBrown , "Eric W. Biederman" , Daniel Jordan , Michel Lespinasse , Bernd Edlinger , Andrei Vagin , Yafang Shao , Christian Brauner , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-doc@vger.kernel.org Content-Type: text/plain; charset="UTF-8" To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Android captures per-process system memory state when certain low memory events (e.g a foreground app kill) occur, to identify potential memory hoggers. In order to measure how much memory a process actually consumes, it is necessary to include the DMA buffer sizes for that process in the memory accounting. Since the handle to DMA buffers are raw FDs, it is important to be able to identify which processes have FD references to a DMA buffer. Currently, DMA buffer FDs can be accounted using /proc//fd/* and /proc//fdinfo -- both are only readable by the process owner, as follows: 1. Do a readlink on each FD. 2. If the target path begins with "/dmabuf", then the FD is a dmabuf FD. 3. stat the file to get the dmabuf inode number. 4. Read/ proc//fdinfo/, to get the DMA buffer size. Accessing other processes' fdinfo requires root privileges. This limits the use of the interface to debugging environments and is not suitable for production builds. Granting root privileges even to a system process increases the attack surface and is highly undesirable. Since fdinfo doesn't permit reading process memory and manipulating process state, allow accessing fdinfo under PTRACE_MODE_READ_FSCRED. Suggested-by: Jann Horn Signed-off-by: Kalesh Singh --- Changes in v2: - Update patch description fs/proc/base.c | 4 ++-- fs/proc/fd.c | 15 ++++++++++++++- 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/fs/proc/base.c b/fs/proc/base.c index b3422cda2a91..a37f9de7103f 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -3160,7 +3160,7 @@ static const struct pid_entry tgid_base_stuff[] = { DIR("task", S_IRUGO|S_IXUGO, proc_task_inode_operations, proc_task_operations), DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_operations), DIR("map_files", S_IRUSR|S_IXUSR, proc_map_files_inode_operations, proc_map_files_operations), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdinfo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdinfo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_operations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_operations), @@ -3504,7 +3504,7 @@ static const struct inode_operations proc_tid_comm_inode_operations = { */ static const struct pid_entry tid_base_stuff[] = { DIR("fd", S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_operations), - DIR("fdinfo", S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdinfo_operations), + DIR("fdinfo", S_IRUGO|S_IXUGO, proc_fdinfo_inode_operations, proc_fdinfo_operations), DIR("ns", S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_operations), #ifdef CONFIG_NET DIR("net", S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_operations), diff --git a/fs/proc/fd.c b/fs/proc/fd.c index cb51763ed554..585e213301f9 100644 --- a/fs/proc/fd.c +++ b/fs/proc/fd.c @@ -6,6 +6,7 @@ #include #include #include +#include #include #include #include @@ -72,6 +73,18 @@ static int seq_show(struct seq_file *m, void *v) static int seq_fdinfo_open(struct inode *inode, struct file *file) { + bool allowed = false; + struct task_struct *task = get_proc_task(inode); + + if (!task) + return -ESRCH; + + allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); + put_task_struct(task); + + if (!allowed) + return -EACCES; + return single_open(file, seq_show, inode); } @@ -307,7 +320,7 @@ static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry, struct proc_inode *ei; struct inode *inode; - inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUSR); + inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO); if (!inode) return ERR_PTR(-ENOENT); -- 2.30.0.478.g8a0d178c01-goog