[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140722203614.GF838@moon>
Date: Wed, 23 Jul 2014 00:36:14 +0400
From: Cyrill Gorcunov <gorcunov@...il.com>
To: Kees Cook <keescook@...omium.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
LKML <linux-kernel@...r.kernel.org>, Tejun Heo <tj@...nel.org>,
Andrew Vagin <avagin@...nvz.org>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
Serge Hallyn <serge.hallyn@...onical.com>,
Pavel Emelyanov <xemul@...allels.com>,
Vasiliy Kulikov <segoon@...nwall.com>,
KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>,
Michael Kerrisk <mtk.manpages@...il.com>,
Julien Tinnes <jln@...gle.com>
Subject: Re: [RFC 2/2] prctl: PR_SET_MM -- Introduce PR_SET_MM_MAP operation
On Tue, Jul 22, 2014 at 01:07:51PM -0700, Kees Cook wrote:
> On Fri, Jul 11, 2014 at 10:36 AM, Cyrill Gorcunov <gorcunov@...il.com> wrote:
> > On Wed, Jul 09, 2014 at 07:06:04PM +0400, Cyrill Gorcunov wrote:
> >>
> >> Thanks a lot for comments, Kees! I tend to agre, leaving off the @prctl_map
> >> variable out of macros should make code also shorter, I'll update that's
> >> not the problem. Could you please re-check if I'm not missing something
> >> in security aspects when time permits.
>
> I asked Julien (now in CC) into look at this with me, and he had
> several comments that I've paraphrased/expanded on below...
Thanks a huge, Kees!
> > - @exe_fd is referred from /proc/$pid/exe and when generating
> > coredump. We uses prctl_set_mm_exe_file_locked helper to update
> > this member, so exe-file link modification remains one-shot
> > action.
>
> Controlling exe_fd without privileges may turn out to be dangerous. At
> least things like tomoyo examine it for making policy decisions (see
> tomoyo_manager()).
OK, so if we worry about this that much -- what if I bring some sysctl
variable which would be able to turn this non-root functionality on
and off? In criu we would turn it off when start restoring (with
root privilegues of course) and the once restore is complete we
turn it off back? Sounds reasonable? (I still personally think this
@exe_fd is just a hint and as I mentioned if we have ptrace/preload
rights there damn a lot of ways to inject own code into any program
so that a user won't even notice ;)
> > + /*
> > + * Neither we should allow to override limits if they set.
> > + */
> > + rlim = rlimit(RLIMIT_DATA);
> > + if (rlim < RLIM_INFINITY) {
> > + if ((prctl_map->brk - prctl_map->start_brk) +
> > + (prctl_map->end_data - prctl_map->start_data) > rlim)
> > + goto out;
> > + }
>
> I think this has an integer overflow in it. This could be avoided by
> checking brk vs start_brk with an additional __prctl_check_order call.
> This is done for start_data and end_data already.
Thanks, will update.
> > + rlim = rlimit(RLIMIT_STACK);
> > + if (rlim < RLIM_INFINITY) {
> > +#ifdef CONFIG_STACK_GROWSUP
> > + unsigned long left = stack_vma->vm_end - prctl_map->start_stack;
> > +#else
> > + unsigned long left = prctl_map->start_stack - stack_vma->vm_start;
> > +#endif
> > + if (left > rlim)
> > + goto out;
> > + }
>
> There should be a __prctl_check_order for stack_start vs
> stack_vma->vm_end (and another in the stack growsdown case).
Sure, thanks!
> > + if (prctl_map.auxv && prctl_map.auxv_size) {
> > + up_read(&mm->mmap_sem);
> > + memset(user_auxv, 0, sizeof(user_auxv));
> > + error = copy_from_user(user_auxv,
> > + (const void __user *)prctl_map.auxv,
> > + prctl_map.auxv_size);
> > + down_read(&mm->mmap_sem);
> > + if (error)
> > + goto out;
> > + }
>
> "prctl_map.auxv" should be removed from this if condition (i.e. make
> sure any auxv_size does, in fact, attempt to write to the .auxv
> location).
Hmm, why? Only having two variables valid we can be sure the copy_from_user
is proper to call. You propose to make it as
if (prctl_map.auxv_size) {
...
copy_from_user(user_auxv,
? Or I misunderstand you?
> > +
> > + if (prctl_map.exe_fd != (u32)-1) {
> > + error = prctl_set_mm_exe_file_locked(mm, prctl_map.exe_fd);
> > + if (error)
> > + goto out;
> > + }
> > +
> > + if (prctl_map.auxv && prctl_map.auxv_size) {
> > + user_auxv[AT_VECTOR_SIZE - 2] = 0;
> > + user_auxv[AT_VECTOR_SIZE - 1] = 0;
> > +
> > + task_lock(current);
> > + memcpy(mm->saved_auxv, user_auxv, sizeof(user_auxv));
> > + task_unlock(current);
> > + }
>
> This auxv if should probably be consolidated with the first one. And
> it may be worthwhile to mention this is making sure AT_NULL is at the
> end.
As to AT_NULL -- sure, I'll update (0 is the same as AT_NULL iirc,
so I'm sorry to not making it explicit). As to consolidation -- no.
Look, the whole idea is to modify real current->mm if and only if
everything else won't fail so I splitted it as
1) validate_prctl_map_locked to make sure all members we're
going to use are valid
2) copy auxv vector -- if we fail here, we can exit safely
leaving current->mm completely untouched
3) setup new exe_fd, again if we fail here current->mm remains
untouched
4) finally we can modify current->mm because no error can happen
here
> > +
> > + mm->start_code = prctl_map.start_code;
> > + mm->end_code = prctl_map.end_code;
> > + mm->start_data = prctl_map.start_data;
> > + mm->end_data = prctl_map.end_data;
> > + mm->start_brk = prctl_map.start_brk;
> > + mm->brk = prctl_map.brk;
> > + mm->start_stack = prctl_map.start_stack;
> > + mm->arg_start = prctl_map.arg_start;
> > + mm->arg_end = prctl_map.arg_end;
> > + mm->env_start = prctl_map.env_start;
> > + mm->env_end = prctl_map.env_end;
> > +
> > + error = 0;
> > +out:
> > + up_read(&mm->mmap_sem);
> > + return error;
> > +}
> > +#endif /* CONFIG_CHECKPOINT_RESTORE */
>
> To avoid future errors, the rlimit checks should probably go into some
> common place, so that the same functions are called during rlimit
> checks when "classic" modification of fields such as ->brk happen (for
> instance in sys_brk).
OK, I'll take a look, this will require one more patch but I hope
we're fine with that.
Thanks a lot for comments!
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists