Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3269200pxj; Mon, 14 Jun 2021 19:28:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxIZD1+U0gICFqtDoGNzP89u/plQwEPKIVCxT//BEQ77lm9eZuKBPHScEXT49H1bdTUgFrh X-Received: by 2002:aa7:d798:: with SMTP id s24mr20724098edq.243.1623724126974; Mon, 14 Jun 2021 19:28:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623724126; cv=none; d=google.com; s=arc-20160816; b=t7Q5GD1GOYDnd65n0CcGXYXoE3fklnbXpEsOaiLBdsMM7P1xv+4ps24kEr/4Z1Sehk DmZ8qxQD9su8XRCaauBw7TP6D21vlrFllMwHNMf1YfXKbVfwwRqhYuvYvc4fiNrifwoU GPSbLow73b65bXJ1f20X8AjFAVi1gxcicpIZsZgd8HlGEEMrBQUC/4qkh8gkVZP/Mhho +OB00chUnhL9bb8EWGbZ+d/WHv+HriHoA2VqhD3y8B6eDAVfvchnUdEa9ltz5DCk/1F8 A9r/Z+f+zXhIgogeJCn319VU8BraDdDHGXnj9ttqfmKFiMLA4PZQKnWgGCDKRI/TgVIN 8r1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:references :in-reply-to:mime-version:dkim-signature; bh=brCiM+F9mGjut7Dannz5jBzKbs3SodWAdjrUja4GsqQ=; b=f2/jd0S8nSA/Xtx5vnW44zSsMDpQchVTKlumkriYJeZfDbK3n/hY4Ip8ybY/zie0Ss K87+t6b9sTXaCWvaC58fKszUlAjvxTGembZPWKXjyXrXQ5WA1jUY6MJZZnNr7H3ihnNQ sPVacQ0hxLiuuOfWBoVDZz0MkIMhrcsRtKmb7N9l7agYoRAXI+EaoLRCER5F8iHnhn+e 4e5siVEl5qZ0t6CUW+qyKmu1Z9sjq43ce4zTGslch9UNujt3zKUz5NlgoqCd6WAhLKM3 /ngnvkYG1wtQ0RQD+dl4z2m5M0L2LUyP0Nq2YAbvXa8aRLdSb2aqt+wCsNLeuOhwjM+h aR5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HEnAn1ol; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i9si13537920edu.471.2021.06.14.19.28.24; Mon, 14 Jun 2021 19:28:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HEnAn1ol; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230451AbhFOC0t (ORCPT + 99 others); Mon, 14 Jun 2021 22:26:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230141AbhFOC0s (ORCPT ); Mon, 14 Jun 2021 22:26:48 -0400 Received: from mail-yb1-xb2f.google.com (mail-yb1-xb2f.google.com [IPv6:2607:f8b0:4864:20::b2f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A351C061767; Mon, 14 Jun 2021 19:24:44 -0700 (PDT) Received: by mail-yb1-xb2f.google.com with SMTP id q21so18237515ybg.8; Mon, 14 Jun 2021 19:24:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=brCiM+F9mGjut7Dannz5jBzKbs3SodWAdjrUja4GsqQ=; b=HEnAn1olYigaQNwMq7Pg7M9qQXgha1+G3M8Te9QROcv+UPfHbzA+pyQiY/uyUplDho syI/EJ0aS5ILxHohmJkYvgPeUXUvFw0UJ+48gj22wbC9kvUQClmfmZLzrrJbqUr54NI0 XIPfavRvfpItyC7jNpihhrsAwdizq3bVqYy7pjJaGlXxf3djw8Jxhaht1pwkyi2g4zHJ FBd13UJ9//BjvbwrXSxXwhNaY/NP7dlPuCEN+qXeWFvbgTzpKowrQL5FWyqdTsKjKqa6 /fQvn05zs7IeWE/WtYl+/6FFwsh8P8pcdZxWFaHG//HqMHlmCCUOI3OY9ukreN48hS1s 4Y1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=brCiM+F9mGjut7Dannz5jBzKbs3SodWAdjrUja4GsqQ=; b=hu7Lgg6fZKxGOCmF2jPdWlZstPkRcwPzYuATAMWfheKB57NJo2cicr+7zXfuhrXirU HEPOU62W6QVb7OGmmov2p2YbZNIAMSb0FpZgqA6P15U+fMJs/mrzMrMzZGznv33XWt+l 186CPmfgGHV6F+aBUQOFWTB08tYWNwuiwk1aksSjI5JoP90ExJwMsTKp/qeE/4kR+eDu d2ztqTg/VH1id77/VnKwSErlcXuGnWTWz5Zvv7xcPYTQn3CfPLrT4tONmsY/aPnl5V10 MgF0EalZInTFTYc7tQtD1yOBEvdRd37Gt+RRwt6jafersu8bGX0uFwqxJmIhYbEdMbgQ RFKQ== X-Gm-Message-State: AOAM531pbXe1C0qX/8ya7qst07n5HlKT3r8JJ5qkXYpC3vnx9E9xXYU9 BwCVsIpuZVPL6vEHMwbjTXFmSh+tH2zm0mvUjtPfPg3I1QncL5G6dVo= X-Received: by 2002:a9d:730a:: with SMTP id e10mr13703661otk.97.1623722136501; Mon, 14 Jun 2021 18:55:36 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:f03:0:0:0:0:0 with HTTP; Mon, 14 Jun 2021 18:55:35 -0700 (PDT) In-Reply-To: <202106141503.B3144DFE@keescook> References: <20210608171221.276899-1-keescook@chromium.org> <20210614100234.12077-1-youling257@gmail.com> <202106140826.7912F27CD@keescook> <202106140941.7CE5AE64@keescook> <202106141503.B3144DFE@keescook> From: youling 257 Date: Tue, 15 Jun 2021 09:55:35 +0800 Message-ID: Subject: Re: [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct To: Kees Cook Cc: torvalds@linux-foundation.org, christian.brauner@ubuntu.com, andrea.righi@canonical.com, linux-kernel@vger.kernel.org, stable@vger.kernel.org, regressions@lists.linux.dev, linux-security-module@vger.kernel.org, Paul Moore , Stephen Smalley , SElinux list Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org if try to find problem on userspace, i used linux 5.13rc6 on old android 7 cm14.1, not aosp android 11. http://git.osdn.net/view?p=android-x86/system-core.git;a=blob;f=init/service.cpp;h=a5334f447fc2fc34453d2f6a37523bedccadc690;hb=refs/heads/cm-14.1-x86#l457 457 if (!seclabel_.empty()) { 458 if (setexeccon(seclabel_.c_str()) < 0) { 459 ERROR("cannot setexeccon('%s'): %s\n", 460 seclabel_.c_str(), strerror(errno)); 461 _exit(127); 462 } 463 } 2021-06-15 6:50 GMT+08:00, Kees Cook : > On Tue, Jun 15, 2021 at 02:46:19AM +0800, youling 257 wrote: >> I test this patch cause "init: cannot setexeccon(u:r:ueventd:s0) >> operation not permitted. >> init ctrl_write_limited. > > Thanks for testing! > > This appears to come from here: > https://github.com/aosp-mirror/platform_system_core/blob/master/init/service.cpp#L242 > > > In setexeccon(), I see (pid=0, attr="exec"): > > fd = openattr(pid, attr, O_RDWR | O_CLOEXEC); > ... > ret = write(fd, context2, strlen(context2) + 1); > ... > close(fd); > > > and openattr() is doing: > ... > rc = asprintf(&path, "/proc/thread-self/attr/%s", attr); > if (rc < 0) > return -1; > fd = open(path, flags | O_CLOEXEC); > ... > > I'm not sure how the above could fail. (mm_access() always allows > introspection...) > > The only way I can understand the check failing is if a process did: > > open, exec, write > > But setexeccon() is not doing anything between the open and the write... > > I will keep looking... > > -Kees > > -- > Kees Cook >