Message ID | 20240301213442.198443-1-adrian.ratiu@collabora.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:fa17:b0:10a:f01:a869 with SMTP id ju23csp167999dyc; Fri, 1 Mar 2024 13:35:56 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVVZxzFUXAxUrQSj+qQdCs0Wbo13U1I+6ulchbtqwRIoooPZIeJ+CzMKOStODfOPY9wDPE5FQTQXAs238qFjdEA1guoFg== X-Google-Smtp-Source: AGHT+IEXRkcOr042EbP6VF3JGbvOOHlYjSP+Y5oWNGl3NPuF+LO4HbColLfHKapIZuZYdiazTn2V X-Received: by 2002:a17:906:4148:b0:a40:2c33:1f42 with SMTP id l8-20020a170906414800b00a402c331f42mr2244479ejk.15.1709328956317; Fri, 01 Mar 2024 13:35:56 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709328956; cv=pass; d=google.com; s=arc-20160816; b=vLJcb63BDGa4WyjTVPZmc5M1/3wztyziN/GLFuzydg9ELQNEoS05M2v6PaG1nLkiSo VY0grP9jpsUpV5qTKNvNleX31BChT6Q6zeibu7ikcWw7x8fb9hfiGcluwoKbqB1BdDHK zemfknggIZGdFlXQZw1bVY++48e3sEbhNNepsVUw9NwO5bn73KmcKDyF1sx0D9jRkU0A DutejnuYy7v7HxsAN/tdzgicnE7BXbSPjj8vKVfMFq5ajmpwWwoKMj4kA8KmxBNjmW7l zydR1BLElFFszqfTMwoXLuXgEDMpzM3ySdFod+Be9aoq42h7HSUTvDTkS5norpHhxc0O mZkg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=zT2nSMpNwSwMvo6IzsObRAoBaBrws9cyc5aoLnZ8grY=; fh=5Fxmq6mL1tQaSZ9/nQoSIJOqE1lYKnVCFgNaRenm4kQ=; b=IqEE7qD/E/VBUreecA9RMRGaSNPI47lpqCuCWiiaakBk+lI/LdozFrHTddoUJ32zKY 7ek7gRO18Q9VLga5UrFjQ+5r1XAa3HZzvsg7YdaoSr1mfIjbcQ6vcDKhqr5dCKxBWecg uMLY6nk1c2SFnRzyqo+86mYUsi2PRHsBeca5A5hCJvQYNvxvC6Ps/maI/zhSMcsS/54R IiYibHWgVqwTkx9Wf0gUpzvY44NippzuHoYBnrH8p4/XQubCoFXTdNfZYeJHSAvFT/9P IZV4VIf8Mht5EewgbTAe8TmSF7GfxNPiVM4MXn8EhUIMXbJos8NEGT9cAGlUwjVGgC2y 38tw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=HT5uddga; arc=pass (i=1 spf=pass spfdomain=collabora.com dkim=pass dkdomain=collabora.com dmarc=pass fromdomain=collabora.com); spf=pass (google.com: domain of linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id e6-20020a170906080600b00a3d2b261366si1720797ejd.664.2024.03.01.13.35.56 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Mar 2024 13:35:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=HT5uddga; arc=pass (i=1 spf=pass spfdomain=collabora.com dkim=pass dkdomain=collabora.com dmarc=pass fromdomain=collabora.com); spf=pass (google.com: domain of linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89153-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id BF0301F2512B for <ouuuleilei@gmail.com>; Fri, 1 Mar 2024 21:35:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 177AE58AD2; Fri, 1 Mar 2024 21:35:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=collabora.com header.i=@collabora.com header.b="HT5uddga" Received: from madrid.collaboradmins.com (madrid.collaboradmins.com [46.235.227.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C0E152575F; Fri, 1 Mar 2024 21:35:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=46.235.227.194 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709328933; cv=none; b=lcqg4yYbZZOBAp1SNA3K9jlwhnY6CgEUoDCXjlRd1LWpgRQCniXsAOKIIfJInFXKqOgOGwgsS165duZFjfFWuG+o9bnYBuRpJGX5kf5/7P0175OYGU1mSO9ZG03BGsXOnxRt4b0/z3fw9SBmeblrhTqRomlwyDAl90VkZZQtzyU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709328933; c=relaxed/simple; bh=ovQaWvkaGZ/LnYGPrkBjG38YueW5tZyWNmaAd4cJT+M=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=eqXI9iaYyk3ehd02QYhkvi2fUD2vE2qdhDE4ch85W8KmVnLhkRMg1cRT7FCzY/H2r1+nQRtybogDcwaEjhXjgfmanonrA1ndfzeR0SWmcR36gj1ZF+JIGorwr+RvbSKNWJ+MRG4JEM3BIPZfNYgYcLTUwHLu9v/87VTG4Vj6s9k= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=collabora.com; spf=pass smtp.mailfrom=collabora.com; dkim=pass (2048-bit key) header.d=collabora.com header.i=@collabora.com header.b=HT5uddga; arc=none smtp.client-ip=46.235.227.194 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=collabora.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=collabora.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1709328929; bh=ovQaWvkaGZ/LnYGPrkBjG38YueW5tZyWNmaAd4cJT+M=; h=From:To:Cc:Subject:Date:From; b=HT5uddgaUVon2LEaN6yJDtC6YitYrB2ajbiq0KSRqv5VzTTaeGvVz53y07xxY2l9R QJ/spXcam/3piLZHkPcrBxRAv4BouXNJW3gxcreJUReEgaQx6APmN9tyqhueOb1zZT oRYZ0EMQGZMZu8pC4lI9Syuq/h2iXTfXA9srOHZQAE7JbzfNG3h1zIlmrNwt180Lkb aSwOJBLeXLfNk8PNYOBrVUweqG5yqOgWb3aQwPIamWdLDoBXo0rOalDVOGAIuX46FV 4Uzqg+sC8pmb0L/cbffytNEuLO9JtHw8Utf0Lg0TbKM9mrz8QQGowphB3RQZA0AoEt 3OGPljWk4gk8g== Received: from localhost.localdomain (cola.collaboradmins.com [195.201.22.229]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: aratiu) by madrid.collaboradmins.com (Postfix) with ESMTPSA id 09BB7378208B; Fri, 1 Mar 2024 21:35:28 +0000 (UTC) From: Adrian Ratiu <adrian.ratiu@collabora.com> To: linux-fsdevel@vger.kernel.org Cc: kernel@collabora.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, Adrian Ratiu <adrian.ratiu@collabora.com>, Guenter Roeck <groeck@chromium.org>, Doug Anderson <dianders@chromium.org>, Kees Cook <keescook@chromium.org>, Jann Horn <jannh@google.com>, Andrew Morton <akpm@linux-foundation.org>, Randy Dunlap <rdunlap@infradead.org>, Christian Brauner <brauner@kernel.org>, Mike Frysinger <vapier@chromium.org> Subject: [PATCH v2] proc: allow restricting /proc/pid/mem writes Date: Fri, 1 Mar 2024 23:34:42 +0200 Message-ID: <20240301213442.198443-1-adrian.ratiu@collabora.com> X-Mailer: git-send-email 2.44.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1792361319641930750 X-GMAIL-MSGID: 1792361319641930750 |
Series |
[v2] proc: allow restricting /proc/pid/mem writes
|
|
Commit Message
Adrian Ratiu
March 1, 2024, 9:34 p.m. UTC
Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, after which it got allowed in commit 198214a7ee50 ("proc: enable writing to /proc/pid/mem"). Famous last words from that patch: "no longer a security hazard". :) Afterwards exploits appeared started causing drama like [1]. The /proc/*/mem exploits can be rather sophisticated like [2] which installed an arbitrary payload from noexec storage into a running process then exec'd it, which itself could include an ELF loader to run arbitrary code off noexec storage. As part of hardening against these types of attacks, distrbutions can restrict /proc/*/mem to only allow writes when they makes sense, like in case of debuggers which have ptrace permissions, as they are able to access memory anyway via PTRACE_POKEDATA and friends. Dropping the mode bits disables write access for non-root users. Trying to `chmod` the paths back fails as the kernel rejects it. For users with CAP_DAC_OVERRIDE (usually just root) we have to disable the mem_write callback to avoid bypassing the mode bits. Writes can be used to bypass permissions on memory maps, even if a memory region is mapped r-x (as is a program's executable pages), the process can open its own /proc/self/mem file and write to the pages directly. Even if seccomp filters block mmap/mprotect calls with W|X perms, they often cannot block open calls as daemons want to read/write their own runtime state and seccomp filters cannot check file paths. Write calls also can't be blocked in general via seccomp. Since the mem file is part of the dynamic /proc/<pid>/ space, we can't run chmod once at boot to restrict it (and trying to react to every process and run chmod doesn't scale, and the kernel no longer allows chmod on any of these paths). SELinux could be used with a rule to cover all /proc/*/mem files, but even then having multiple ways to deny an attack is useful in case on layer fails. [1] https://lwn.net/Articles/476947/ [2] https://issues.chromium.org/issues/40089045 Based on an initial patch by Mike Frysinger <vapier@chromium.org>. Cc: Guenter Roeck <groeck@chromium.org> Cc: Doug Anderson <dianders@chromium.org> Cc: Kees Cook <keescook@chromium.org> Cc: Jann Horn <jannh@google.com> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Randy Dunlap <rdunlap@infradead.org> Cc: Christian Brauner <brauner@kernel.org> Co-developed-by: Mike Frysinger <vapier@chromium.org> Signed-off-by: Mike Frysinger <vapier@chromium.org> Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> --- Changes in v2: * Added boot time parameter with default kconfig option * Moved check earlier in mem_open() instead of mem_write() * Simplified implementation branching * Removed dependency on CONFIG_MEMCG --- .../admin-guide/kernel-parameters.txt | 4 ++ fs/proc/base.c | 47 ++++++++++++++++++- security/Kconfig | 22 +++++++++ 3 files changed, 71 insertions(+), 2 deletions(-)
Comments
On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > after which it got allowed in commit 198214a7ee50 ("proc: enable > writing to /proc/pid/mem"). Famous last words from that patch: > "no longer a security hazard". :) > > Afterwards exploits appeared started causing drama like [1]. The nit: I think "appeared" can be dropped here. > /proc/*/mem exploits can be rather sophisticated like [2] which > installed an arbitrary payload from noexec storage into a running > process then exec'd it, which itself could include an ELF loader > to run arbitrary code off noexec storage. > > As part of hardening against these types of attacks, distrbutions > can restrict /proc/*/mem to only allow writes when they makes sense, > like in case of debuggers which have ptrace permissions, as they > are able to access memory anyway via PTRACE_POKEDATA and friends. > > Dropping the mode bits disables write access for non-root users. > Trying to `chmod` the paths back fails as the kernel rejects it. > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > disable the mem_write callback to avoid bypassing the mode bits. > > Writes can be used to bypass permissions on memory maps, even if a > memory region is mapped r-x (as is a program's executable pages), > the process can open its own /proc/self/mem file and write to the > pages directly. > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > they often cannot block open calls as daemons want to read/write > their own runtime state and seccomp filters cannot check file paths. > Write calls also can't be blocked in general via seccomp. > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > can't run chmod once at boot to restrict it (and trying to react > to every process and run chmod doesn't scale, and the kernel no > longer allows chmod on any of these paths). > > SELinux could be used with a rule to cover all /proc/*/mem files, > but even then having multiple ways to deny an attack is useful in > case on layer fails. Everything above here is good to keep in the commit log, but it's all the "background". Please also write here what has been done to address the background above it. e.g.: "Introduce a CONFIG and a __ro_after_init runtime toggle to make it so only processes that are already tracing the task to write to /proc/<pid>/mem." etc > > [1] https://lwn.net/Articles/476947/ > [2] https://issues.chromium.org/issues/40089045 These can be: Link: https://lwn.net/Articles/476947/ [1] Link: https://issues.chromium.org/issues/40089045 [2] > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > Cc: Guenter Roeck <groeck@chromium.org> > Cc: Doug Anderson <dianders@chromium.org> > Cc: Kees Cook <keescook@chromium.org> > Cc: Jann Horn <jannh@google.com> > Cc: Andrew Morton <akpm@linux-foundation.org> > Cc: Randy Dunlap <rdunlap@infradead.org> > Cc: Christian Brauner <brauner@kernel.org> > Co-developed-by: Mike Frysinger <vapier@chromium.org> > Signed-off-by: Mike Frysinger <vapier@chromium.org> > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > --- > Changes in v2: > * Added boot time parameter with default kconfig option > * Moved check earlier in mem_open() instead of mem_write() > * Simplified implementation branching > * Removed dependency on CONFIG_MEMCG Can you mention in the commit log what behaviors have been tested with this patch? For example, I assume gdb still works with restrict_proc_mem_write=y ? When this is enabled, what _does_ break that people might expect to work? > --- > .../admin-guide/kernel-parameters.txt | 4 ++ > fs/proc/base.c | 47 ++++++++++++++++++- > security/Kconfig | 22 +++++++++ > 3 files changed, 71 insertions(+), 2 deletions(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index 460b97a1d0da..0647e2f54248 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -5618,6 +5618,10 @@ > reset_devices [KNL] Force drivers to reset the underlying device > during initialization. > > + restrict_proc_mem_write= [KNL] Please add here: Format: <bool> > + Enable or disable write access to /proc/*/mem files. > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > + > resume= [SWSUSP] > Specify the partition device for software suspend > Format: > diff --git a/fs/proc/base.c b/fs/proc/base.c > index 98a031ac2648..92f668191312 100644 > --- a/fs/proc/base.c > +++ b/fs/proc/base.c > @@ -152,6 +152,30 @@ struct pid_entry { > NULL, &proc_pid_attr_operations, \ > { .lsmid = LSMID }) > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE Please drop this CONFIG entirely -- it should be always available for all builds of the kernel. Only CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON needs to remain. > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > + restrict_proc_mem_write); > +static int __init early_restrict_proc_mem_write(char *buf) > +{ > + int ret; > + bool bool_result; > + > + ret = kstrtobool(buf, &bool_result); > + if (ret) > + return ret; > + > + if (bool_result) > + static_branch_enable(&restrict_proc_mem_write); > + else > + static_branch_disable(&restrict_proc_mem_write); > + return 0; > +} > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > +# define PROC_PID_MEM_MODE S_IRUSR > +#else > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > +#endif PROC_PID_MEM_MODE will need to be a __ro_after_init variable, set by early_restrict_proc_mem_write, otherwise the mode won't change based on the runtime setting. e.g.: #ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON mode_t proc_pid_mem_mode __ro_after_init = S_IRUSR; #else mode_t proc_pid_mem_mode __ro_after_init = (S_IRUSR|S_IWUSR); #endif DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, restrict_proc_mem_write); .. if (bool_result) { static_branch_enable(&restrict_proc_mem_write); proc_pid_mem_mode = S_IRUSR; } else { static_branch_disable(&restrict_proc_mem_write); proc_pid_mem_mode = (S_IRUSR|S_IWUSR); } .. REG("mem", proc_pid_mem_mode, proc_mem_operations), > + > /* > * Count the number of hardlinks for the pid_entry table, excluding the . > * and .. links. > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > { > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE Drop this ifdef (as mentioned above). > + struct mm_struct *mm = file->private_data; > + struct task_struct *task = get_proc_task(inode); > + > + if (mm && task) { > + /* Only allow writes by processes already ptracing the target task */ > + if (file->f_mode & FMODE_WRITE && > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > + &restrict_proc_mem_write)) { Do we need to also do an mm_access() on the task to verify that the task we're about to check has its mm still matching file->private_data? The PID can change out from under us (but the mm cannot). > + rcu_read_lock(); > + if (!ptracer_capable(current, mm->user_ns) || > + current != ptrace_parent(task)) If you're just allowing "already ptracing", why include the ptracer_capable() check? > + ret = -EACCES; > + rcu_read_unlock(); > + } > + put_task_struct(task); > + } > +#endif > + > /* OK to pass negative loff_t, we can catch out-of-range */ > file->f_mode |= FMODE_UNSIGNED_OFFSET; > > @@ -3281,7 +3324,7 @@ static const struct pid_entry tgid_base_stuff[] = { > #ifdef CONFIG_NUMA > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > #endif > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > LNK("cwd", proc_cwd_link), > LNK("root", proc_root_link), > LNK("exe", proc_exe_link), > @@ -3631,7 +3674,7 @@ static const struct pid_entry tid_base_stuff[] = { > #ifdef CONFIG_NUMA > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > #endif > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > LNK("cwd", proc_cwd_link), > LNK("root", proc_root_link), > LNK("exe", proc_exe_link), > diff --git a/security/Kconfig b/security/Kconfig > index 412e76f1575d..ffee9e847ed9 100644 > --- a/security/Kconfig > +++ b/security/Kconfig > @@ -19,6 +19,28 @@ config SECURITY_DMESG_RESTRICT > > If you are unsure how to answer this question, answer N. > > +config SECURITY_PROC_MEM_RESTRICT_WRITE > + bool "Restrict /proc/*/mem write access" > + default n > + help > + This restricts writes to /proc/<pid>/mem, except when the current > + process ptraces the /proc/<pid>/mem task, because a ptracer already > + has write access to the tracee memory. > + > + Write access to this file allows bypassing memory map permissions, > + such as modifying read-only code. > + > + If you are unsure how to answer this question, answer N. > + > +config SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > + bool "Default state of /proc/*/mem write restriction" > + depends on SECURITY_PROC_MEM_RESTRICT_WRITE > + default y > + help > + /proc/*/mem write access is controlled by kernel boot param > + "restrict_proc_mem_write" and this config chooses the default > + boot state. As mentioned, I'd say merge the help texts here, but drop SECURITY_PROC_MEM_RESTRICT_WRITE. > + > config SECURITY > bool "Enable different security models" > depends on SYSFS > -- > 2.30.2 > Thanks for this! I look forward to turning it on. :) -Kees
On Saturday, March 02, 2024 01:55 EET, Kees Cook <keescook@chromium.org> wrote: > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > writing to /proc/pid/mem"). Famous last words from that patch: > > "no longer a security hazard". :) > > > > Afterwards exploits appeared started causing drama like [1]. The > > nit: I think "appeared" can be dropped here. > > > /proc/*/mem exploits can be rather sophisticated like [2] which > > installed an arbitrary payload from noexec storage into a running > > process then exec'd it, which itself could include an ELF loader > > to run arbitrary code off noexec storage. > > > > As part of hardening against these types of attacks, distrbutions > > can restrict /proc/*/mem to only allow writes when they makes sense, > > like in case of debuggers which have ptrace permissions, as they > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > Dropping the mode bits disables write access for non-root users. > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > disable the mem_write callback to avoid bypassing the mode bits. > > > > Writes can be used to bypass permissions on memory maps, even if a > > memory region is mapped r-x (as is a program's executable pages), > > the process can open its own /proc/self/mem file and write to the > > pages directly. > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > they often cannot block open calls as daemons want to read/write > > their own runtime state and seccomp filters cannot check file paths. > > Write calls also can't be blocked in general via seccomp. > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > can't run chmod once at boot to restrict it (and trying to react > > to every process and run chmod doesn't scale, and the kernel no > > longer allows chmod on any of these paths). > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > but even then having multiple ways to deny an attack is useful in > > case on layer fails. > > Everything above here is good to keep in the commit log, but it's all > the "background". Please also write here what has been done to address > the background above it. e.g.: > > "Introduce a CONFIG and a __ro_after_init runtime toggle to make > it so only processes that are already tracing the task to write to > /proc/<pid>/mem." etc > > > > > [1] https://lwn.net/Articles/476947/ > > [2] https://issues.chromium.org/issues/40089045 > > These can be: > > Link: https://lwn.net/Articles/476947/ [1] > Link: https://issues.chromium.org/issues/40089045 [2] > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > Cc: Guenter Roeck <groeck@chromium.org> > > Cc: Doug Anderson <dianders@chromium.org> > > Cc: Kees Cook <keescook@chromium.org> > > Cc: Jann Horn <jannh@google.com> > > Cc: Andrew Morton <akpm@linux-foundation.org> > > Cc: Randy Dunlap <rdunlap@infradead.org> > > Cc: Christian Brauner <brauner@kernel.org> > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > --- > > Changes in v2: > > * Added boot time parameter with default kconfig option > > * Moved check earlier in mem_open() instead of mem_write() > > * Simplified implementation branching > > * Removed dependency on CONFIG_MEMCG > > Can you mention in the commit log what behaviors have been tested with > this patch? For example, I assume gdb still works with > restrict_proc_mem_write=y ? > Thanks, I will address all the above commit message feedback in v3. Yes, gdb and gdbserver work with restrict_proc_mem_write=y. My testing is focused on the correct functioning of GDB and gdbserver (lldb/server use ptrace POKEDATA so they work regardless of restrict_proc_mem_write). This all started from my attempt to fix gdbserver by adding a ptrace fallback in case /proc/pid/mem writes are blocked without any exception, because that breaks basic functionality like setting breakpoints. GDB upstream NAK'ed my ptrace fallback approach because it's doesn't work well with their /proc/pid/mem focused design required for non-stop mode (the default all-stop mode is emulated on top of non-stop), as well as ptrace peek/poke requiring a live task which can cause memory access problems if the ptraced task dies. Other solutions were considered by GDB upstream, including using the process_vm_writev & co, but they respect page permissions and GDB has to write RO pages to set breakpoints. In the end GDB maintainers directed me to do a proper kernel fix with an exception for tasks already ptracing others, because from a security perspective, they can already access tracee memory regardless of /proc/pid/mem restrictions, so here we are. :) > When this is enabled, what _does_ break that people might expect to > work? With the current iteration, all things I tested work as expected. It is rather hard to come up with things that break with restrict_proc_mem_write=y, because other than debuggers and exploits I don't have other use-cases. Obvious things like "echo >/proc/self/mem" get permission denied, but that is expected with restrict_proc_mem_write=y, so I wouldn't classify it as breakage. In theory there might be some weird/legacy apps which might break, so that is why I suggest we land the mechanism as default off, and later, after it gets tested in various distributions, pull the trigger to make it default on. > > > --- > > .../admin-guide/kernel-parameters.txt | 4 ++ > > fs/proc/base.c | 47 ++++++++++++++++++- > > security/Kconfig | 22 +++++++++ > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > index 460b97a1d0da..0647e2f54248 100644 > > --- a/Documentation/admin-guide/kernel-parameters.txt > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > @@ -5618,6 +5618,10 @@ > > reset_devices [KNL] Force drivers to reset the underlying device > > during initialization. > > > > + restrict_proc_mem_write= [KNL] > > Please add here: > > Format: <bool> > Ack, will do in v3. > > + Enable or disable write access to /proc/*/mem files. > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > + > > resume= [SWSUSP] > > Specify the partition device for software suspend > > Format: > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > index 98a031ac2648..92f668191312 100644 > > --- a/fs/proc/base.c > > +++ b/fs/proc/base.c > > @@ -152,6 +152,30 @@ struct pid_entry { > > NULL, &proc_pid_attr_operations, \ > > { .lsmid = LSMID }) > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > Please drop this CONFIG entirely -- it should be always available for > all builds of the kernel. Only CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > needs to remain. > Ack, will do in v3. > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + restrict_proc_mem_write); > > +static int __init early_restrict_proc_mem_write(char *buf) > > +{ > > + int ret; > > + bool bool_result; > > + > > + ret = kstrtobool(buf, &bool_result); > > + if (ret) > > + return ret; > > + > > + if (bool_result) > > + static_branch_enable(&restrict_proc_mem_write); > > + else > > + static_branch_disable(&restrict_proc_mem_write); > > + return 0; > > +} > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > +# define PROC_PID_MEM_MODE S_IRUSR > > +#else > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > +#endif > > PROC_PID_MEM_MODE will need to be a __ro_after_init variable, set by > early_restrict_proc_mem_write, otherwise the mode won't change based on > the runtime setting. e.g.: > > #ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > mode_t proc_pid_mem_mode __ro_after_init = S_IRUSR; > #else > mode_t proc_pid_mem_mode __ro_after_init = (S_IRUSR|S_IWUSR); > #endif > > DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > restrict_proc_mem_write); > ... > if (bool_result) { > static_branch_enable(&restrict_proc_mem_write); > proc_pid_mem_mode = S_IRUSR; > } else { > static_branch_disable(&restrict_proc_mem_write); > proc_pid_mem_mode = (S_IRUSR|S_IWUSR); > } > ... > REG("mem", proc_pid_mem_mode, proc_mem_operations), > > Ack, will do in v3. > > + > > /* > > * Count the number of hardlinks for the pid_entry table, excluding the . > > * and .. links. > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > { > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > Drop this ifdef (as mentioned above). > > > + struct mm_struct *mm = file->private_data; > > + struct task_struct *task = get_proc_task(inode); > > + > > + if (mm && task) { > > + /* Only allow writes by processes already ptracing the target task */ > > + if (file->f_mode & FMODE_WRITE && > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + &restrict_proc_mem_write)) { > > Do we need to also do an mm_access() on the task to verify that the task > we're about to check has its mm still matching file->private_data? The > PID can change out from under us (but the mm cannot). > Likely yes, will look into this for v3. > > + rcu_read_lock(); > > + if (!ptracer_capable(current, mm->user_ns) || > > + current != ptrace_parent(task)) > > If you're just allowing "already ptracing", why include the > ptracer_capable() check? > It is a very good observation that the check is redundant. :) It is a remnant from a previous iteration of this patch, from when I was proposing solutions to GDB upstream. I left it there because it doesn't do much harm to verify capability as well, more of a precaution / test invariant than anything else. I'll remove it in v3 since it might cause confusion. > > + ret = -EACCES; > > + rcu_read_unlock(); > > + } > > + put_task_struct(task); > > + } > > +#endif > > + > > /* OK to pass negative loff_t, we can catch out-of-range */ > > file->f_mode |= FMODE_UNSIGNED_OFFSET; > > > > @@ -3281,7 +3324,7 @@ static const struct pid_entry tgid_base_stuff[] = { > > #ifdef CONFIG_NUMA > > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > > #endif > > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > > LNK("cwd", proc_cwd_link), > > LNK("root", proc_root_link), > > LNK("exe", proc_exe_link), > > @@ -3631,7 +3674,7 @@ static const struct pid_entry tid_base_stuff[] = { > > #ifdef CONFIG_NUMA > > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > > #endif > > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > > LNK("cwd", proc_cwd_link), > > LNK("root", proc_root_link), > > LNK("exe", proc_exe_link), > > diff --git a/security/Kconfig b/security/Kconfig > > index 412e76f1575d..ffee9e847ed9 100644 > > --- a/security/Kconfig > > +++ b/security/Kconfig > > @@ -19,6 +19,28 @@ config SECURITY_DMESG_RESTRICT > > > > If you are unsure how to answer this question, answer N. > > > > +config SECURITY_PROC_MEM_RESTRICT_WRITE > > + bool "Restrict /proc/*/mem write access" > > + default n > > + help > > + This restricts writes to /proc/<pid>/mem, except when the current > > + process ptraces the /proc/<pid>/mem task, because a ptracer already > > + has write access to the tracee memory. > > + > > + Write access to this file allows bypassing memory map permissions, > > + such as modifying read-only code. > > + > > + If you are unsure how to answer this question, answer N. > > + > > +config SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > > + bool "Default state of /proc/*/mem write restriction" > > + depends on SECURITY_PROC_MEM_RESTRICT_WRITE > > + default y > > + help > > + /proc/*/mem write access is controlled by kernel boot param > > + "restrict_proc_mem_write" and this config chooses the default > > + boot state. > > As mentioned, I'd say merge the help texts here, but drop > SECURITY_PROC_MEM_RESTRICT_WRITE. > Ack, will do in v3. > > + > > config SECURITY > > bool "Enable different security models" > > depends on SYSFS > > -- > > 2.30.2 > > > > Thanks for this! I look forward to turning it on. :) > Thank you very much for all your feedback! It is much appreciated. I'll wait a few more days before sending v3 to let others comment, then address everything. > -Kees > > -- > Kees Cook
On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > after which it got allowed in commit 198214a7ee50 ("proc: enable > writing to /proc/pid/mem"). Famous last words from that patch: > "no longer a security hazard". :) > > Afterwards exploits appeared started causing drama like [1]. The > /proc/*/mem exploits can be rather sophisticated like [2] which > installed an arbitrary payload from noexec storage into a running > process then exec'd it, which itself could include an ELF loader > to run arbitrary code off noexec storage. > > As part of hardening against these types of attacks, distrbutions > can restrict /proc/*/mem to only allow writes when they makes sense, > like in case of debuggers which have ptrace permissions, as they > are able to access memory anyway via PTRACE_POKEDATA and friends. > > Dropping the mode bits disables write access for non-root users. > Trying to `chmod` the paths back fails as the kernel rejects it. > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > disable the mem_write callback to avoid bypassing the mode bits. > > Writes can be used to bypass permissions on memory maps, even if a > memory region is mapped r-x (as is a program's executable pages), > the process can open its own /proc/self/mem file and write to the > pages directly. > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > they often cannot block open calls as daemons want to read/write > their own runtime state and seccomp filters cannot check file paths. > Write calls also can't be blocked in general via seccomp. > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > can't run chmod once at boot to restrict it (and trying to react > to every process and run chmod doesn't scale, and the kernel no > longer allows chmod on any of these paths). > > SELinux could be used with a rule to cover all /proc/*/mem files, > but even then having multiple ways to deny an attack is useful in > case on layer fails. > > [1] https://lwn.net/Articles/476947/ > [2] https://issues.chromium.org/issues/40089045 > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > Cc: Guenter Roeck <groeck@chromium.org> > Cc: Doug Anderson <dianders@chromium.org> > Cc: Kees Cook <keescook@chromium.org> > Cc: Jann Horn <jannh@google.com> > Cc: Andrew Morton <akpm@linux-foundation.org> > Cc: Randy Dunlap <rdunlap@infradead.org> > Cc: Christian Brauner <brauner@kernel.org> > Co-developed-by: Mike Frysinger <vapier@chromium.org> > Signed-off-by: Mike Frysinger <vapier@chromium.org> > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > --- > Changes in v2: > * Added boot time parameter with default kconfig option > * Moved check earlier in mem_open() instead of mem_write() > * Simplified implementation branching > * Removed dependency on CONFIG_MEMCG > --- > .../admin-guide/kernel-parameters.txt | 4 ++ > fs/proc/base.c | 47 ++++++++++++++++++- > security/Kconfig | 22 +++++++++ > 3 files changed, 71 insertions(+), 2 deletions(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index 460b97a1d0da..0647e2f54248 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -5618,6 +5618,10 @@ > reset_devices [KNL] Force drivers to reset the underlying device > during initialization. > > + restrict_proc_mem_write= [KNL] > + Enable or disable write access to /proc/*/mem files. > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > + > resume= [SWSUSP] > Specify the partition device for software suspend > Format: > diff --git a/fs/proc/base.c b/fs/proc/base.c > index 98a031ac2648..92f668191312 100644 > --- a/fs/proc/base.c > +++ b/fs/proc/base.c > @@ -152,6 +152,30 @@ struct pid_entry { > NULL, &proc_pid_attr_operations, \ > { .lsmid = LSMID }) > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > + restrict_proc_mem_write); > +static int __init early_restrict_proc_mem_write(char *buf) > +{ > + int ret; > + bool bool_result; > + > + ret = kstrtobool(buf, &bool_result); > + if (ret) > + return ret; > + > + if (bool_result) > + static_branch_enable(&restrict_proc_mem_write); > + else > + static_branch_disable(&restrict_proc_mem_write); > + return 0; > +} > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > +# define PROC_PID_MEM_MODE S_IRUSR > +#else > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > +#endif > + > /* > * Count the number of hardlinks for the pid_entry table, excluding the . > * and .. links. > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > { > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > + struct mm_struct *mm = file->private_data; > + struct task_struct *task = get_proc_task(inode); > + > + if (mm && task) { > + /* Only allow writes by processes already ptracing the target task */ > + if (file->f_mode & FMODE_WRITE && > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > + &restrict_proc_mem_write)) { > + rcu_read_lock(); > + if (!ptracer_capable(current, mm->user_ns) || > + current != ptrace_parent(task)) > + ret = -EACCES; Uhm, this will break the seccomp notifier, no? So you can't turn on SECURITY_PROC_MEM_RESTRICT_WRITE when you want to use the seccomp notifier to do system call interception and rewrite memory locations of the calling task, no? Which is very much relied upon in various container managers and possibly other security tools. Which means that you can't turn this on in any of the regular distros. So you need to either account for the calling task being a seccomp supervisor for the task whose memory it is trying to access or you need to provide a migration path by adding an api that let's caller's perform these writes through the seccomp notifier.
On Monday, March 04, 2024 15:20 EET, Christian Brauner <brauner@kernel.org> wrote: > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > writing to /proc/pid/mem"). Famous last words from that patch: > > "no longer a security hazard". :) > > > > Afterwards exploits appeared started causing drama like [1]. The > > /proc/*/mem exploits can be rather sophisticated like [2] which > > installed an arbitrary payload from noexec storage into a running > > process then exec'd it, which itself could include an ELF loader > > to run arbitrary code off noexec storage. > > > > As part of hardening against these types of attacks, distrbutions > > can restrict /proc/*/mem to only allow writes when they makes sense, > > like in case of debuggers which have ptrace permissions, as they > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > Dropping the mode bits disables write access for non-root users. > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > disable the mem_write callback to avoid bypassing the mode bits. > > > > Writes can be used to bypass permissions on memory maps, even if a > > memory region is mapped r-x (as is a program's executable pages), > > the process can open its own /proc/self/mem file and write to the > > pages directly. > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > they often cannot block open calls as daemons want to read/write > > their own runtime state and seccomp filters cannot check file paths. > > Write calls also can't be blocked in general via seccomp. > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > can't run chmod once at boot to restrict it (and trying to react > > to every process and run chmod doesn't scale, and the kernel no > > longer allows chmod on any of these paths). > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > but even then having multiple ways to deny an attack is useful in > > case on layer fails. > > > > [1] https://lwn.net/Articles/476947/ > > [2] https://issues.chromium.org/issues/40089045 > > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > Cc: Guenter Roeck <groeck@chromium.org> > > Cc: Doug Anderson <dianders@chromium.org> > > Cc: Kees Cook <keescook@chromium.org> > > Cc: Jann Horn <jannh@google.com> > > Cc: Andrew Morton <akpm@linux-foundation.org> > > Cc: Randy Dunlap <rdunlap@infradead.org> > > Cc: Christian Brauner <brauner@kernel.org> > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > --- > > Changes in v2: > > * Added boot time parameter with default kconfig option > > * Moved check earlier in mem_open() instead of mem_write() > > * Simplified implementation branching > > * Removed dependency on CONFIG_MEMCG > > --- > > .../admin-guide/kernel-parameters.txt | 4 ++ > > fs/proc/base.c | 47 ++++++++++++++++++- > > security/Kconfig | 22 +++++++++ > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > index 460b97a1d0da..0647e2f54248 100644 > > --- a/Documentation/admin-guide/kernel-parameters.txt > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > @@ -5618,6 +5618,10 @@ > > reset_devices [KNL] Force drivers to reset the underlying device > > during initialization. > > > > + restrict_proc_mem_write= [KNL] > > + Enable or disable write access to /proc/*/mem files. > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > + > > resume= [SWSUSP] > > Specify the partition device for software suspend > > Format: > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > index 98a031ac2648..92f668191312 100644 > > --- a/fs/proc/base.c > > +++ b/fs/proc/base.c > > @@ -152,6 +152,30 @@ struct pid_entry { > > NULL, &proc_pid_attr_operations, \ > > { .lsmid = LSMID }) > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + restrict_proc_mem_write); > > +static int __init early_restrict_proc_mem_write(char *buf) > > +{ > > + int ret; > > + bool bool_result; > > + > > + ret = kstrtobool(buf, &bool_result); > > + if (ret) > > + return ret; > > + > > + if (bool_result) > > + static_branch_enable(&restrict_proc_mem_write); > > + else > > + static_branch_disable(&restrict_proc_mem_write); > > + return 0; > > +} > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > +# define PROC_PID_MEM_MODE S_IRUSR > > +#else > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > +#endif > > + > > /* > > * Count the number of hardlinks for the pid_entry table, excluding the . > > * and .. links. > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > { > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > + struct mm_struct *mm = file->private_data; > > + struct task_struct *task = get_proc_task(inode); > > + > > + if (mm && task) { > > + /* Only allow writes by processes already ptracing the target task */ > > + if (file->f_mode & FMODE_WRITE && > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + &restrict_proc_mem_write)) { > > + rcu_read_lock(); > > + if (!ptracer_capable(current, mm->user_ns) || > > + current != ptrace_parent(task)) > > + ret = -EACCES; > > Uhm, this will break the seccomp notifier, no? So you can't turn on > SECURITY_PROC_MEM_RESTRICT_WRITE when you want to use the seccomp > notifier to do system call interception and rewrite memory locations of > the calling task, no? Which is very much relied upon in various > container managers and possibly other security tools. > > Which means that you can't turn this on in any of the regular distros. > > So you need to either account for the calling task being a seccomp > supervisor for the task whose memory it is trying to access or you need > to provide a migration path by adding an api that let's caller's perform > these writes through the seccomp notifier. Thanks for raising this! I did test seccomp filtering/blocking functionality which seemed to work but I'll make sure to also test syscall interception before sending v3, to confirm whether it breaks. The simplest solution is to add an exception for seccomp supervisors just like we did for tracers, yes, so I'm inclined to go with that if needed. :) Ideally we find all exceptions and fix them before defaulting this to on -- unforeseen breakages is why I want to default it to OFF, at least initially, until we can be reasonably sure all cases have been covered.
On Mon, Mar 04, 2024 at 01:48:19PM +0000, Adrian Ratiu wrote: > On Monday, March 04, 2024 15:20 EET, Christian Brauner <brauner@kernel.org> wrote: > > > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > > writing to /proc/pid/mem"). Famous last words from that patch: > > > "no longer a security hazard". :) > > > > > > Afterwards exploits appeared started causing drama like [1]. The > > > /proc/*/mem exploits can be rather sophisticated like [2] which > > > installed an arbitrary payload from noexec storage into a running > > > process then exec'd it, which itself could include an ELF loader > > > to run arbitrary code off noexec storage. > > > > > > As part of hardening against these types of attacks, distrbutions > > > can restrict /proc/*/mem to only allow writes when they makes sense, > > > like in case of debuggers which have ptrace permissions, as they > > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > > > Dropping the mode bits disables write access for non-root users. > > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > > disable the mem_write callback to avoid bypassing the mode bits. > > > > > > Writes can be used to bypass permissions on memory maps, even if a > > > memory region is mapped r-x (as is a program's executable pages), > > > the process can open its own /proc/self/mem file and write to the > > > pages directly. > > > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > > they often cannot block open calls as daemons want to read/write > > > their own runtime state and seccomp filters cannot check file paths. > > > Write calls also can't be blocked in general via seccomp. > > > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > > can't run chmod once at boot to restrict it (and trying to react > > > to every process and run chmod doesn't scale, and the kernel no > > > longer allows chmod on any of these paths). > > > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > > but even then having multiple ways to deny an attack is useful in > > > case on layer fails. > > > > > > [1] https://lwn.net/Articles/476947/ > > > [2] https://issues.chromium.org/issues/40089045 > > > > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > > > Cc: Guenter Roeck <groeck@chromium.org> > > > Cc: Doug Anderson <dianders@chromium.org> > > > Cc: Kees Cook <keescook@chromium.org> > > > Cc: Jann Horn <jannh@google.com> > > > Cc: Andrew Morton <akpm@linux-foundation.org> > > > Cc: Randy Dunlap <rdunlap@infradead.org> > > > Cc: Christian Brauner <brauner@kernel.org> > > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > > --- > > > Changes in v2: > > > * Added boot time parameter with default kconfig option > > > * Moved check earlier in mem_open() instead of mem_write() > > > * Simplified implementation branching > > > * Removed dependency on CONFIG_MEMCG > > > --- > > > .../admin-guide/kernel-parameters.txt | 4 ++ > > > fs/proc/base.c | 47 ++++++++++++++++++- > > > security/Kconfig | 22 +++++++++ > > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > > index 460b97a1d0da..0647e2f54248 100644 > > > --- a/Documentation/admin-guide/kernel-parameters.txt > > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > > @@ -5618,6 +5618,10 @@ > > > reset_devices [KNL] Force drivers to reset the underlying device > > > during initialization. > > > > > > + restrict_proc_mem_write= [KNL] > > > + Enable or disable write access to /proc/*/mem files. > > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > > + > > > resume= [SWSUSP] > > > Specify the partition device for software suspend > > > Format: > > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > > index 98a031ac2648..92f668191312 100644 > > > --- a/fs/proc/base.c > > > +++ b/fs/proc/base.c > > > @@ -152,6 +152,30 @@ struct pid_entry { > > > NULL, &proc_pid_attr_operations, \ > > > { .lsmid = LSMID }) > > > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > > + restrict_proc_mem_write); > > > +static int __init early_restrict_proc_mem_write(char *buf) > > > +{ > > > + int ret; > > > + bool bool_result; > > > + > > > + ret = kstrtobool(buf, &bool_result); > > > + if (ret) > > > + return ret; > > > + > > > + if (bool_result) > > > + static_branch_enable(&restrict_proc_mem_write); > > > + else > > > + static_branch_disable(&restrict_proc_mem_write); > > > + return 0; > > > +} > > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > > +# define PROC_PID_MEM_MODE S_IRUSR > > > +#else > > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > > +#endif > > > + > > > /* > > > * Count the number of hardlinks for the pid_entry table, excluding the . > > > * and .. links. > > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > > { > > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > > + struct mm_struct *mm = file->private_data; > > > + struct task_struct *task = get_proc_task(inode); > > > + > > > + if (mm && task) { > > > + /* Only allow writes by processes already ptracing the target task */ > > > + if (file->f_mode & FMODE_WRITE && > > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > > + &restrict_proc_mem_write)) { > > > + rcu_read_lock(); > > > + if (!ptracer_capable(current, mm->user_ns) || > > > + current != ptrace_parent(task)) > > > + ret = -EACCES; > > > > Uhm, this will break the seccomp notifier, no? So you can't turn on > > SECURITY_PROC_MEM_RESTRICT_WRITE when you want to use the seccomp > > notifier to do system call interception and rewrite memory locations of > > the calling task, no? Which is very much relied upon in various > > container managers and possibly other security tools. > > > > Which means that you can't turn this on in any of the regular distros. > > > > So you need to either account for the calling task being a seccomp > > supervisor for the task whose memory it is trying to access or you need > > to provide a migration path by adding an api that let's caller's perform > > these writes through the seccomp notifier. > > Thanks for raising this! > > I did test seccomp filtering/blocking functionality which seemed to > work but I'll make sure to also test syscall interception before > sending v3, to confirm whether it breaks. > > The simplest solution is to add an exception for seccomp supervisors > just like we did for tracers, yes, so I'm inclined to go with that if > needed. :) Ok. Note that your patch also doesn't cover process_vm_writev() which means that you can still use that as an alternative to write to memory - albeit with a lote more raciness. IOW, a seccomp notifier can do the dance of: pidfd = clone3(CLONE_PIDFD) // handle error int fd_mem = open("/proc/$pid/mem", O_RDWR);: // handle error if (pidfd_send_signal(pidfd, 0, ...) == 0) write(fd_mem, ...); which lets it avoid the raciness. That's not possible with process_vm_writev() especially if it's received via AF_UNIX sockets which happens if the seccomp notifier lives in a proxy process. I know that happens in the wild. So overall, it seems a bit odd to me because why block /proc/<pid>/mem specifically and not also cover process_vm_writev()? Because that's easy to block via regular seccomp system call filtering?
On Saturday, March 02, 2024 01:55 EET, Kees Cook <keescook@chromium.org> wrote: > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > writing to /proc/pid/mem"). Famous last words from that patch: > > "no longer a security hazard". :) > > > > Afterwards exploits appeared started causing drama like [1]. The > > nit: I think "appeared" can be dropped here. > > > /proc/*/mem exploits can be rather sophisticated like [2] which > > installed an arbitrary payload from noexec storage into a running > > process then exec'd it, which itself could include an ELF loader > > to run arbitrary code off noexec storage. > > > > As part of hardening against these types of attacks, distrbutions > > can restrict /proc/*/mem to only allow writes when they makes sense, > > like in case of debuggers which have ptrace permissions, as they > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > Dropping the mode bits disables write access for non-root users. > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > disable the mem_write callback to avoid bypassing the mode bits. > > > > Writes can be used to bypass permissions on memory maps, even if a > > memory region is mapped r-x (as is a program's executable pages), > > the process can open its own /proc/self/mem file and write to the > > pages directly. > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > they often cannot block open calls as daemons want to read/write > > their own runtime state and seccomp filters cannot check file paths. > > Write calls also can't be blocked in general via seccomp. > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > can't run chmod once at boot to restrict it (and trying to react > > to every process and run chmod doesn't scale, and the kernel no > > longer allows chmod on any of these paths). > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > but even then having multiple ways to deny an attack is useful in > > case on layer fails. > > Everything above here is good to keep in the commit log, but it's all > the "background". Please also write here what has been done to address > the background above it. e.g.: > > "Introduce a CONFIG and a __ro_after_init runtime toggle to make > it so only processes that are already tracing the task to write to > /proc/<pid>/mem." etc > > > > > [1] https://lwn.net/Articles/476947/ > > [2] https://issues.chromium.org/issues/40089045 > > These can be: > > Link: https://lwn.net/Articles/476947/ [1] > Link: https://issues.chromium.org/issues/40089045 [2] > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > Cc: Guenter Roeck <groeck@chromium.org> > > Cc: Doug Anderson <dianders@chromium.org> > > Cc: Kees Cook <keescook@chromium.org> > > Cc: Jann Horn <jannh@google.com> > > Cc: Andrew Morton <akpm@linux-foundation.org> > > Cc: Randy Dunlap <rdunlap@infradead.org> > > Cc: Christian Brauner <brauner@kernel.org> > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > --- > > Changes in v2: > > * Added boot time parameter with default kconfig option > > * Moved check earlier in mem_open() instead of mem_write() > > * Simplified implementation branching > > * Removed dependency on CONFIG_MEMCG > > Can you mention in the commit log what behaviors have been tested with > this patch? For example, I assume gdb still works with > restrict_proc_mem_write=y ? > > When this is enabled, what _does_ break that people might expect to > work? > > > --- > > .../admin-guide/kernel-parameters.txt | 4 ++ > > fs/proc/base.c | 47 ++++++++++++++++++- > > security/Kconfig | 22 +++++++++ > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > index 460b97a1d0da..0647e2f54248 100644 > > --- a/Documentation/admin-guide/kernel-parameters.txt > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > @@ -5618,6 +5618,10 @@ > > reset_devices [KNL] Force drivers to reset the underlying device > > during initialization. > > > > + restrict_proc_mem_write= [KNL] > > Please add here: > > Format: <bool> > > > + Enable or disable write access to /proc/*/mem files. > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > + > > resume= [SWSUSP] > > Specify the partition device for software suspend > > Format: > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > index 98a031ac2648..92f668191312 100644 > > --- a/fs/proc/base.c > > +++ b/fs/proc/base.c > > @@ -152,6 +152,30 @@ struct pid_entry { > > NULL, &proc_pid_attr_operations, \ > > { .lsmid = LSMID }) > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > Please drop this CONFIG entirely -- it should be always available for > all builds of the kernel. Only CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > needs to remain. > > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + restrict_proc_mem_write); > > +static int __init early_restrict_proc_mem_write(char *buf) > > +{ > > + int ret; > > + bool bool_result; > > + > > + ret = kstrtobool(buf, &bool_result); > > + if (ret) > > + return ret; > > + > > + if (bool_result) > > + static_branch_enable(&restrict_proc_mem_write); > > + else > > + static_branch_disable(&restrict_proc_mem_write); > > + return 0; > > +} > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > +# define PROC_PID_MEM_MODE S_IRUSR > > +#else > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > +#endif > > PROC_PID_MEM_MODE will need to be a __ro_after_init variable, set by > early_restrict_proc_mem_write, otherwise the mode won't change based on > the runtime setting. e.g.: > > #ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > mode_t proc_pid_mem_mode __ro_after_init = S_IRUSR; > #else > mode_t proc_pid_mem_mode __ro_after_init = (S_IRUSR|S_IWUSR); > #endif > > DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > restrict_proc_mem_write); > ... > if (bool_result) { > static_branch_enable(&restrict_proc_mem_write); > proc_pid_mem_mode = S_IRUSR; > } else { > static_branch_disable(&restrict_proc_mem_write); > proc_pid_mem_mode = (S_IRUSR|S_IWUSR); > } > ... > REG("mem", proc_pid_mem_mode, proc_mem_operations), I'm having trouble implementing this because the proc_pid_mem_mode initializer needs to be a compile-time constant, so I can't set a runtime value in the REG() definition like suggested above. This was not an issue in v2 because we had two separate kconfigs: - one which enabled the feature and controlled the static build-time file modes (CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE) - another which set the default runtime value and more importantly which depended on the first one so the values are consistent (CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON) Do you have a suggestion how to fix this? Maybe store the flags in a static key? I'm asking because I'm not very familiar with static keys. Or maybe we can continue using the 2 kconfig options? > > > > + > > /* > > * Count the number of hardlinks for the pid_entry table, excluding the . > > * and .. links. > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > { > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > Drop this ifdef (as mentioned above). > > > + struct mm_struct *mm = file->private_data; > > + struct task_struct *task = get_proc_task(inode); > > + > > + if (mm && task) { > > + /* Only allow writes by processes already ptracing the target task */ > > + if (file->f_mode & FMODE_WRITE && > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + &restrict_proc_mem_write)) { > > Do we need to also do an mm_access() on the task to verify that the task > we're about to check has its mm still matching file->private_data? The > PID can change out from under us (but the mm cannot). > > > + rcu_read_lock(); > > + if (!ptracer_capable(current, mm->user_ns) || > > + current != ptrace_parent(task)) > > If you're just allowing "already ptracing", why include the > ptracer_capable() check? > > > + ret = -EACCES; > > + rcu_read_unlock(); > > + } > > + put_task_struct(task); > > + } > > +#endif > > + > > /* OK to pass negative loff_t, we can catch out-of-range */ > > file->f_mode |= FMODE_UNSIGNED_OFFSET; > > > > @@ -3281,7 +3324,7 @@ static const struct pid_entry tgid_base_stuff[] = { > > #ifdef CONFIG_NUMA > > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > > #endif > > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > > LNK("cwd", proc_cwd_link), > > LNK("root", proc_root_link), > > LNK("exe", proc_exe_link), > > @@ -3631,7 +3674,7 @@ static const struct pid_entry tid_base_stuff[] = { > > #ifdef CONFIG_NUMA > > REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), > > #endif > > - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), > > + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), > > LNK("cwd", proc_cwd_link), > > LNK("root", proc_root_link), > > LNK("exe", proc_exe_link), > > diff --git a/security/Kconfig b/security/Kconfig > > index 412e76f1575d..ffee9e847ed9 100644 > > --- a/security/Kconfig > > +++ b/security/Kconfig > > @@ -19,6 +19,28 @@ config SECURITY_DMESG_RESTRICT > > > > If you are unsure how to answer this question, answer N. > > > > +config SECURITY_PROC_MEM_RESTRICT_WRITE > > + bool "Restrict /proc/*/mem write access" > > + default n > > + help > > + This restricts writes to /proc/<pid>/mem, except when the current > > + process ptraces the /proc/<pid>/mem task, because a ptracer already > > + has write access to the tracee memory. > > + > > + Write access to this file allows bypassing memory map permissions, > > + such as modifying read-only code. > > + > > + If you are unsure how to answer this question, answer N. > > + > > +config SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON > > + bool "Default state of /proc/*/mem write restriction" > > + depends on SECURITY_PROC_MEM_RESTRICT_WRITE > > + default y > > + help > > + /proc/*/mem write access is controlled by kernel boot param > > + "restrict_proc_mem_write" and this config chooses the default > > + boot state. > > As mentioned, I'd say merge the help texts here, but drop > SECURITY_PROC_MEM_RESTRICT_WRITE. > > > + > > config SECURITY > > bool "Enable different security models" > > depends on SYSFS > > -- > > 2.30.2 > > > > Thanks for this! I look forward to turning it on. :) > > -Kees > > -- > Kees Cook
On Monday, March 04, 2024 16:05 EET, Christian Brauner <brauner@kernel.org> wrote: > On Mon, Mar 04, 2024 at 01:48:19PM +0000, Adrian Ratiu wrote: > > On Monday, March 04, 2024 15:20 EET, Christian Brauner <brauner@kernel.org> wrote: > > > > > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > > > writing to /proc/pid/mem"). Famous last words from that patch: > > > > "no longer a security hazard". :) > > > > > > > > Afterwards exploits appeared started causing drama like [1]. The > > > > /proc/*/mem exploits can be rather sophisticated like [2] which > > > > installed an arbitrary payload from noexec storage into a running > > > > process then exec'd it, which itself could include an ELF loader > > > > to run arbitrary code off noexec storage. > > > > > > > > As part of hardening against these types of attacks, distrbutions > > > > can restrict /proc/*/mem to only allow writes when they makes sense, > > > > like in case of debuggers which have ptrace permissions, as they > > > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > > > > > Dropping the mode bits disables write access for non-root users. > > > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > > > disable the mem_write callback to avoid bypassing the mode bits. > > > > > > > > Writes can be used to bypass permissions on memory maps, even if a > > > > memory region is mapped r-x (as is a program's executable pages), > > > > the process can open its own /proc/self/mem file and write to the > > > > pages directly. > > > > > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > > > they often cannot block open calls as daemons want to read/write > > > > their own runtime state and seccomp filters cannot check file paths. > > > > Write calls also can't be blocked in general via seccomp. > > > > > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > > > can't run chmod once at boot to restrict it (and trying to react > > > > to every process and run chmod doesn't scale, and the kernel no > > > > longer allows chmod on any of these paths). > > > > > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > > > but even then having multiple ways to deny an attack is useful in > > > > case on layer fails. > > > > > > > > [1] https://lwn.net/Articles/476947/ > > > > [2] https://issues.chromium.org/issues/40089045 > > > > > > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > > > > > Cc: Guenter Roeck <groeck@chromium.org> > > > > Cc: Doug Anderson <dianders@chromium.org> > > > > Cc: Kees Cook <keescook@chromium.org> > > > > Cc: Jann Horn <jannh@google.com> > > > > Cc: Andrew Morton <akpm@linux-foundation.org> > > > > Cc: Randy Dunlap <rdunlap@infradead.org> > > > > Cc: Christian Brauner <brauner@kernel.org> > > > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > > > --- > > > > Changes in v2: > > > > * Added boot time parameter with default kconfig option > > > > * Moved check earlier in mem_open() instead of mem_write() > > > > * Simplified implementation branching > > > > * Removed dependency on CONFIG_MEMCG > > > > --- > > > > .../admin-guide/kernel-parameters.txt | 4 ++ > > > > fs/proc/base.c | 47 ++++++++++++++++++- > > > > security/Kconfig | 22 +++++++++ > > > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > > > index 460b97a1d0da..0647e2f54248 100644 > > > > --- a/Documentation/admin-guide/kernel-parameters.txt > > > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > > > @@ -5618,6 +5618,10 @@ > > > > reset_devices [KNL] Force drivers to reset the underlying device > > > > during initialization. > > > > > > > > + restrict_proc_mem_write= [KNL] > > > > + Enable or disable write access to /proc/*/mem files. > > > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > > > + > > > > resume= [SWSUSP] > > > > Specify the partition device for software suspend > > > > Format: > > > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > > > index 98a031ac2648..92f668191312 100644 > > > > --- a/fs/proc/base.c > > > > +++ b/fs/proc/base.c > > > > @@ -152,6 +152,30 @@ struct pid_entry { > > > > NULL, &proc_pid_attr_operations, \ > > > > { .lsmid = LSMID }) > > > > > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > > > + restrict_proc_mem_write); > > > > +static int __init early_restrict_proc_mem_write(char *buf) > > > > +{ > > > > + int ret; > > > > + bool bool_result; > > > > + > > > > + ret = kstrtobool(buf, &bool_result); > > > > + if (ret) > > > > + return ret; > > > > + > > > > + if (bool_result) > > > > + static_branch_enable(&restrict_proc_mem_write); > > > > + else > > > > + static_branch_disable(&restrict_proc_mem_write); > > > > + return 0; > > > > +} > > > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > > > +# define PROC_PID_MEM_MODE S_IRUSR > > > > +#else > > > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > > > +#endif > > > > + > > > > /* > > > > * Count the number of hardlinks for the pid_entry table, excluding the . > > > > * and .. links. > > > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > > > { > > > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > > > + struct mm_struct *mm = file->private_data; > > > > + struct task_struct *task = get_proc_task(inode); > > > > + > > > > + if (mm && task) { > > > > + /* Only allow writes by processes already ptracing the target task */ > > > > + if (file->f_mode & FMODE_WRITE && > > > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > > > + &restrict_proc_mem_write)) { > > > > + rcu_read_lock(); > > > > + if (!ptracer_capable(current, mm->user_ns) || > > > > + current != ptrace_parent(task)) > > > > + ret = -EACCES; > > > > > > Uhm, this will break the seccomp notifier, no? So you can't turn on > > > SECURITY_PROC_MEM_RESTRICT_WRITE when you want to use the seccomp > > > notifier to do system call interception and rewrite memory locations of > > > the calling task, no? Which is very much relied upon in various > > > container managers and possibly other security tools. > > > > > > Which means that you can't turn this on in any of the regular distros. > > > > > > So you need to either account for the calling task being a seccomp > > > supervisor for the task whose memory it is trying to access or you need > > > to provide a migration path by adding an api that let's caller's perform > > > these writes through the seccomp notifier. > > > > Thanks for raising this! > > > > I did test seccomp filtering/blocking functionality which seemed to > > work but I'll make sure to also test syscall interception before > > sending v3, to confirm whether it breaks. > > > > The simplest solution is to add an exception for seccomp supervisors > > just like we did for tracers, yes, so I'm inclined to go with that if > > needed. :) > > Ok. Note that your patch also doesn't cover process_vm_writev() which > means that you can still use that as an alternative to write to memory - > albeit with a lote more raciness. IOW, a seccomp notifier can do the > dance of: > > pidfd = clone3(CLONE_PIDFD) > // handle error > int fd_mem = open("/proc/$pid/mem", O_RDWR);: > // handle error > if (pidfd_send_signal(pidfd, 0, ...) == 0) > write(fd_mem, ...); > > which lets it avoid the raciness. That's not possible with > process_vm_writev() especially if it's received via AF_UNIX sockets > which happens if the seccomp notifier lives in a proxy process. I know > that happens in the wild. > > So overall, it seems a bit odd to me because why block /proc/<pid>/mem > specifically and not also cover process_vm_writev()? Because that's easy > to block via regular seccomp system call filtering? Yes, easy to block and also respect page permissions (can't write read-only memory) as well as require ptrace access anyway by checking PTRACE_MODE_ATTACH_REALCREDS.
On Mon, Mar 04, 2024 at 02:20:22PM +0100, Christian Brauner wrote: > On Fri, Mar 01, 2024 at 11:34:42PM +0200, Adrian Ratiu wrote: > > Prior to v2.6.39 write access to /proc/<pid>/mem was restricted, > > after which it got allowed in commit 198214a7ee50 ("proc: enable > > writing to /proc/pid/mem"). Famous last words from that patch: > > "no longer a security hazard". :) > > > > Afterwards exploits appeared started causing drama like [1]. The > > /proc/*/mem exploits can be rather sophisticated like [2] which > > installed an arbitrary payload from noexec storage into a running > > process then exec'd it, which itself could include an ELF loader > > to run arbitrary code off noexec storage. > > > > As part of hardening against these types of attacks, distrbutions > > can restrict /proc/*/mem to only allow writes when they makes sense, > > like in case of debuggers which have ptrace permissions, as they > > are able to access memory anyway via PTRACE_POKEDATA and friends. > > > > Dropping the mode bits disables write access for non-root users. > > Trying to `chmod` the paths back fails as the kernel rejects it. > > > > For users with CAP_DAC_OVERRIDE (usually just root) we have to > > disable the mem_write callback to avoid bypassing the mode bits. > > > > Writes can be used to bypass permissions on memory maps, even if a > > memory region is mapped r-x (as is a program's executable pages), > > the process can open its own /proc/self/mem file and write to the > > pages directly. > > > > Even if seccomp filters block mmap/mprotect calls with W|X perms, > > they often cannot block open calls as daemons want to read/write > > their own runtime state and seccomp filters cannot check file paths. > > Write calls also can't be blocked in general via seccomp. > > > > Since the mem file is part of the dynamic /proc/<pid>/ space, we > > can't run chmod once at boot to restrict it (and trying to react > > to every process and run chmod doesn't scale, and the kernel no > > longer allows chmod on any of these paths). > > > > SELinux could be used with a rule to cover all /proc/*/mem files, > > but even then having multiple ways to deny an attack is useful in > > case on layer fails. > > > > [1] https://lwn.net/Articles/476947/ > > [2] https://issues.chromium.org/issues/40089045 > > > > Based on an initial patch by Mike Frysinger <vapier@chromium.org>. > > > > Cc: Guenter Roeck <groeck@chromium.org> > > Cc: Doug Anderson <dianders@chromium.org> > > Cc: Kees Cook <keescook@chromium.org> > > Cc: Jann Horn <jannh@google.com> > > Cc: Andrew Morton <akpm@linux-foundation.org> > > Cc: Randy Dunlap <rdunlap@infradead.org> > > Cc: Christian Brauner <brauner@kernel.org> > > Co-developed-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Mike Frysinger <vapier@chromium.org> > > Signed-off-by: Adrian Ratiu <adrian.ratiu@collabora.com> > > --- > > Changes in v2: > > * Added boot time parameter with default kconfig option > > * Moved check earlier in mem_open() instead of mem_write() > > * Simplified implementation branching > > * Removed dependency on CONFIG_MEMCG > > --- > > .../admin-guide/kernel-parameters.txt | 4 ++ > > fs/proc/base.c | 47 ++++++++++++++++++- > > security/Kconfig | 22 +++++++++ > > 3 files changed, 71 insertions(+), 2 deletions(-) > > > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > > index 460b97a1d0da..0647e2f54248 100644 > > --- a/Documentation/admin-guide/kernel-parameters.txt > > +++ b/Documentation/admin-guide/kernel-parameters.txt > > @@ -5618,6 +5618,10 @@ > > reset_devices [KNL] Force drivers to reset the underlying device > > during initialization. > > > > + restrict_proc_mem_write= [KNL] > > + Enable or disable write access to /proc/*/mem files. > > + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. > > + > > resume= [SWSUSP] > > Specify the partition device for software suspend > > Format: > > diff --git a/fs/proc/base.c b/fs/proc/base.c > > index 98a031ac2648..92f668191312 100644 > > --- a/fs/proc/base.c > > +++ b/fs/proc/base.c > > @@ -152,6 +152,30 @@ struct pid_entry { > > NULL, &proc_pid_attr_operations, \ > > { .lsmid = LSMID }) > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + restrict_proc_mem_write); > > +static int __init early_restrict_proc_mem_write(char *buf) > > +{ > > + int ret; > > + bool bool_result; > > + > > + ret = kstrtobool(buf, &bool_result); > > + if (ret) > > + return ret; > > + > > + if (bool_result) > > + static_branch_enable(&restrict_proc_mem_write); > > + else > > + static_branch_disable(&restrict_proc_mem_write); > > + return 0; > > +} > > +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); > > +# define PROC_PID_MEM_MODE S_IRUSR > > +#else > > +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) > > +#endif > > + > > /* > > * Count the number of hardlinks for the pid_entry table, excluding the . > > * and .. links. > > @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) > > { > > int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); > > > > +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE > > + struct mm_struct *mm = file->private_data; > > + struct task_struct *task = get_proc_task(inode); > > + > > + if (mm && task) { > > + /* Only allow writes by processes already ptracing the target task */ > > + if (file->f_mode & FMODE_WRITE && > > + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, > > + &restrict_proc_mem_write)) { > > + rcu_read_lock(); > > + if (!ptracer_capable(current, mm->user_ns) || > > + current != ptrace_parent(task)) > > + ret = -EACCES; > > Uhm, this will break the seccomp notifier, no? So you can't turn on > SECURITY_PROC_MEM_RESTRICT_WRITE when you want to use the seccomp > notifier to do system call interception and rewrite memory locations of > the calling task, no? Which is very much relied upon in various > container managers and possibly other security tools. > > Which means that you can't turn this on in any of the regular distros. FWIW, it's a run-time toggle, but yes, let's make sure this works correctly. > So you need to either account for the calling task being a seccomp > supervisor for the task whose memory it is trying to access or you need > to provide a migration path by adding an api that let's caller's perform > these writes through the seccomp notifier. How do seccomp supervisors that use USER_NOTIF do those kinds of memory writes currently? I thought they were actually using ptrace? Everything I'm familiar with is just using SECCOMP_IOCTL_NOTIF_ADDFD, and not doing fancy memory pokes. -Kees
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 460b97a1d0da..0647e2f54248 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -5618,6 +5618,10 @@ reset_devices [KNL] Force drivers to reset the underlying device during initialization. + restrict_proc_mem_write= [KNL] + Enable or disable write access to /proc/*/mem files. + Default is SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON. + resume= [SWSUSP] Specify the partition device for software suspend Format: diff --git a/fs/proc/base.c b/fs/proc/base.c index 98a031ac2648..92f668191312 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -152,6 +152,30 @@ struct pid_entry { NULL, &proc_pid_attr_operations, \ { .lsmid = LSMID }) +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE +DEFINE_STATIC_KEY_MAYBE_RO(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, + restrict_proc_mem_write); +static int __init early_restrict_proc_mem_write(char *buf) +{ + int ret; + bool bool_result; + + ret = kstrtobool(buf, &bool_result); + if (ret) + return ret; + + if (bool_result) + static_branch_enable(&restrict_proc_mem_write); + else + static_branch_disable(&restrict_proc_mem_write); + return 0; +} +early_param("restrict_proc_mem_write", early_restrict_proc_mem_write); +# define PROC_PID_MEM_MODE S_IRUSR +#else +# define PROC_PID_MEM_MODE (S_IRUSR|S_IWUSR) +#endif + /* * Count the number of hardlinks for the pid_entry table, excluding the . * and .. links. @@ -829,6 +853,25 @@ static int mem_open(struct inode *inode, struct file *file) { int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH); +#ifdef CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE + struct mm_struct *mm = file->private_data; + struct task_struct *task = get_proc_task(inode); + + if (mm && task) { + /* Only allow writes by processes already ptracing the target task */ + if (file->f_mode & FMODE_WRITE && + static_branch_maybe(CONFIG_SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON, + &restrict_proc_mem_write)) { + rcu_read_lock(); + if (!ptracer_capable(current, mm->user_ns) || + current != ptrace_parent(task)) + ret = -EACCES; + rcu_read_unlock(); + } + put_task_struct(task); + } +#endif + /* OK to pass negative loff_t, we can catch out-of-range */ file->f_mode |= FMODE_UNSIGNED_OFFSET; @@ -3281,7 +3324,7 @@ static const struct pid_entry tgid_base_stuff[] = { #ifdef CONFIG_NUMA REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), #endif - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), LNK("cwd", proc_cwd_link), LNK("root", proc_root_link), LNK("exe", proc_exe_link), @@ -3631,7 +3674,7 @@ static const struct pid_entry tid_base_stuff[] = { #ifdef CONFIG_NUMA REG("numa_maps", S_IRUGO, proc_pid_numa_maps_operations), #endif - REG("mem", S_IRUSR|S_IWUSR, proc_mem_operations), + REG("mem", PROC_PID_MEM_MODE, proc_mem_operations), LNK("cwd", proc_cwd_link), LNK("root", proc_root_link), LNK("exe", proc_exe_link), diff --git a/security/Kconfig b/security/Kconfig index 412e76f1575d..ffee9e847ed9 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -19,6 +19,28 @@ config SECURITY_DMESG_RESTRICT If you are unsure how to answer this question, answer N. +config SECURITY_PROC_MEM_RESTRICT_WRITE + bool "Restrict /proc/*/mem write access" + default n + help + This restricts writes to /proc/<pid>/mem, except when the current + process ptraces the /proc/<pid>/mem task, because a ptracer already + has write access to the tracee memory. + + Write access to this file allows bypassing memory map permissions, + such as modifying read-only code. + + If you are unsure how to answer this question, answer N. + +config SECURITY_PROC_MEM_RESTRICT_WRITE_DEFAULT_ON + bool "Default state of /proc/*/mem write restriction" + depends on SECURITY_PROC_MEM_RESTRICT_WRITE + default y + help + /proc/*/mem write access is controlled by kernel boot param + "restrict_proc_mem_write" and this config chooses the default + boot state. + config SECURITY bool "Enable different security models" depends on SYSFS