Re: [GIT PULL] Please pull proc and exec work for 5.7-rc1
From: Linus Torvalds
Date: Tue Apr 28 2020 - 18:15:04 EST
On Tue, Apr 28, 2020 at 2:53 PM Jann Horn <jannh@xxxxxxxxxx> wrote:
>
> You don't need LSM_UNSAFE_PTRACE if the tracer has already passed a
> ptrace_may_access() check against the post-execve creds of the target
> - that's no different from having done PTRACE_ATTACH after execve is
> over.
Hmm. That sounds believable, I guess.
But along these ways, I'm starting to think that we might perhaps skip
the lock entirely.
What if we made the rule instead be:
- we move check_unsafe_exec() down. As far as I can tell, there's no
reason it's that early - the flags it sets aren't actually used until
when we actually do that final set_creds..
- we add a "next cred" pointer to the signal struct (or task struct)
- make the rule be that check_unsafe_exec() checks p->ptrace under
the tasklist_lock (or sighand lock - whatever ends up being most
convenient)
- set "next cred" to be the known next cred there too under the lock.
We call this small locked region the "cred sync point".
- ptrace will check if we have the "in_exec" flag set and have one of
those "next cred" pointers, in which case it checks both the old and
the next credentials.
No cred_guard_mutex at all, instead the rule is that as execve() goes
through that "cred sync point", we have two cases
(a) either ptrace has attached (because task->ptrace is set), and it
does the LSM_UNSAFE_PTRACE dance.
or
(b) it knows that ptrace will check the next creds if it races with execve.
And then after execve has installed the final new creds, it just
clears the "next cred" pointer again, because at that point it knows
that now any subsequent PTRACE_ATTACH will be checking the new creds.
So instead of taking and dropping the cred_guard_mutex, we'd basically
get rid of it entirely.
Yeah, I didn't look at the seccomp case, but I guess the issues will be similar.
Linus