* [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm
@ 2024-09-27 15:17 Tycho Andersen
2024-09-27 15:17 ` [PATCH v2 2/2] selftests/exec: add a test to enforce execveat()'s comm Tycho Andersen
2024-09-27 15:45 ` [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Eric W. Biederman
0 siblings, 2 replies; 6+ messages in thread
From: Tycho Andersen @ 2024-09-27 15:17 UTC (permalink / raw)
To: Alexander Viro, Christian Brauner, Jan Kara, Eric Biederman,
Kees Cook
Cc: linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Tycho Andersen, Zbigniew Jędrzejewski-Szmek,
Aleksa Sarai
From: Tycho Andersen <tandersen@netflix.com>
Zbigniew mentioned at Linux Plumber's that systemd is interested in
switching to execveat() for service execution, but can't, because the
contents of /proc/pid/comm are the file descriptor which was used,
instead of the path to the binary. This makes the output of tools like
top and ps useless, especially in a world where most fds are opened
CLOEXEC so the number is truly meaningless.
Change exec path to fix up /proc/pid/comm in the case where we have
allocated one of these synthetic paths in bprm_init(). This way the actual
exec machinery is unchanged, but cosmetically the comm looks reasonable to
admins investigating things.
Signed-off-by: Tycho Andersen <tandersen@netflix.com>
Suggested-by: Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
CC: Aleksa Sarai <cyphar@cyphar.com>
Link: https://github.com/uapi-group/kernel-features#set-comm-field-before-exec
---
v2: * drop the flag, everyone :)
* change the rendered value to f_path.dentry->d_name.name instead of
argv[0], Eric
---
fs/exec.c | 13 ++++++++++++-
1 file changed, 12 insertions(+), 1 deletion(-)
diff --git a/fs/exec.c b/fs/exec.c
index dad402d55681..9520359a8dcc 100644
--- a/fs/exec.c
+++ b/fs/exec.c
@@ -1416,7 +1416,18 @@ int begin_new_exec(struct linux_binprm * bprm)
set_dumpable(current->mm, SUID_DUMP_USER);
perf_event_exec();
- __set_task_comm(me, kbasename(bprm->filename), true);
+
+ /*
+ * If fdpath was set, execveat() made up a path that will
+ * probably not be useful to admins running ps or similar.
+ * Let's fix it up to be something reasonable.
+ */
+ if (bprm->fdpath) {
+ BUILD_BUG_ON(TASK_COMM_LEN > DNAME_INLINE_LEN);
+ __set_task_comm(me, bprm->file->f_path.dentry->d_name.name, true);
+ } else {
+ __set_task_comm(me, kbasename(bprm->filename), true);
+ }
/* An exec changes our domain. We are no longer part of the thread
group */
base-commit: baeb9a7d8b60b021d907127509c44507539c15e5
--
2.34.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH v2 2/2] selftests/exec: add a test to enforce execveat()'s comm
2024-09-27 15:17 [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Tycho Andersen
@ 2024-09-27 15:17 ` Tycho Andersen
2024-09-27 15:45 ` [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Eric W. Biederman
1 sibling, 0 replies; 6+ messages in thread
From: Tycho Andersen @ 2024-09-27 15:17 UTC (permalink / raw)
To: Alexander Viro, Christian Brauner, Jan Kara, Eric Biederman,
Kees Cook
Cc: linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Tycho Andersen
From: Tycho Andersen <tandersen@netflix.com>
We want to ensure that /proc/self/comm stays useful for execveat() callers.
Signed-off-by: Tycho Andersen <tandersen@netflix.com>
---
tools/testing/selftests/exec/execveat.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/tools/testing/selftests/exec/execveat.c b/tools/testing/selftests/exec/execveat.c
index 071e03532cba..091029f4ca9b 100644
--- a/tools/testing/selftests/exec/execveat.c
+++ b/tools/testing/selftests/exec/execveat.c
@@ -419,6 +419,9 @@ int main(int argc, char **argv)
if (argc >= 2) {
/* If we are invoked with an argument, don't run tests. */
const char *in_test = getenv("IN_TEST");
+ /* TASK_COMM_LEN == 16 */
+ char buf[32];
+ int fd;
if (verbose) {
ksft_print_msg("invoked with:\n");
@@ -432,6 +435,28 @@ int main(int argc, char **argv)
return 1;
}
+ fd = open("/proc/self/comm", O_RDONLY);
+ if (fd < 0) {
+ perror("open comm");
+ return 1;
+ }
+
+ if (read(fd, buf, sizeof(buf)) < 0) {
+ close(fd);
+ perror("read comm");
+ return 1;
+ }
+ close(fd);
+
+ /*
+ * /proc/self/comm should fail to convert to an integer, i.e.
+ * atoi() should return 0.
+ */
+ if (atoi(buf) != 0) {
+ ksft_print_msg("bad /proc/self/comm: %s", buf);
+ return 1;
+ }
+
/* Use the final argument as an exit code. */
rc = atoi(argv[argc - 1]);
exit(rc);
--
2.34.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm
2024-09-27 15:17 [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Tycho Andersen
2024-09-27 15:17 ` [PATCH v2 2/2] selftests/exec: add a test to enforce execveat()'s comm Tycho Andersen
@ 2024-09-27 15:45 ` Eric W. Biederman
2024-09-28 21:56 ` Kees Cook
1 sibling, 1 reply; 6+ messages in thread
From: Eric W. Biederman @ 2024-09-27 15:45 UTC (permalink / raw)
To: Tycho Andersen
Cc: Alexander Viro, Christian Brauner, Jan Kara, Kees Cook,
linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Zbigniew Jędrzejewski-Szmek, Aleksa Sarai
Tycho Andersen <tycho@tycho.pizza> writes:
> From: Tycho Andersen <tandersen@netflix.com>
>
> Zbigniew mentioned at Linux Plumber's that systemd is interested in
> switching to execveat() for service execution, but can't, because the
> contents of /proc/pid/comm are the file descriptor which was used,
> instead of the path to the binary. This makes the output of tools like
> top and ps useless, especially in a world where most fds are opened
> CLOEXEC so the number is truly meaningless.
>
> Change exec path to fix up /proc/pid/comm in the case where we have
> allocated one of these synthetic paths in bprm_init(). This way the actual
> exec machinery is unchanged, but cosmetically the comm looks reasonable to
> admins investigating things.
Perhaps change the subject to match the code.
> Signed-off-by: Tycho Andersen <tandersen@netflix.com>
> Suggested-by: Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
> CC: Aleksa Sarai <cyphar@cyphar.com>
> Link: https://github.com/uapi-group/kernel-features#set-comm-field-before-exec
> ---
> v2: * drop the flag, everyone :)
> * change the rendered value to f_path.dentry->d_name.name instead of
> argv[0], Eric
> ---
> fs/exec.c | 13 ++++++++++++-
> 1 file changed, 12 insertions(+), 1 deletion(-)
>
> diff --git a/fs/exec.c b/fs/exec.c
> index dad402d55681..9520359a8dcc 100644
> --- a/fs/exec.c
> +++ b/fs/exec.c
> @@ -1416,7 +1416,18 @@ int begin_new_exec(struct linux_binprm * bprm)
> set_dumpable(current->mm, SUID_DUMP_USER);
>
> perf_event_exec();
> - __set_task_comm(me, kbasename(bprm->filename), true);
> +
> + /*
> + * If fdpath was set, execveat() made up a path that will
> + * probably not be useful to admins running ps or similar.
> + * Let's fix it up to be something reasonable.
> + */
> + if (bprm->fdpath) {
> + BUILD_BUG_ON(TASK_COMM_LEN > DNAME_INLINE_LEN);
> + __set_task_comm(me, bprm->file->f_path.dentry->d_name.name, true);
We can just do this regardless of bprm->fdpath.
It will be a change of behavior on when executing symlinks and possibly
mount points but I don't think we care. If we do then we can add make
it conditional with "if (bprm->fdpath)"
At the very least using the above version unconditionally ought to flush
out any bugs.
It should be 99% application invisible as all an application can see
is argv0. So it is only ps and friends where the comm value is visible.
Eric
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm
2024-09-27 15:45 ` [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Eric W. Biederman
@ 2024-09-28 21:56 ` Kees Cook
[not found] ` <87bk05vobx.fsf@email.froward.int.ebiederm.org>
0 siblings, 1 reply; 6+ messages in thread
From: Kees Cook @ 2024-09-28 21:56 UTC (permalink / raw)
To: Eric W. Biederman
Cc: Tycho Andersen, Alexander Viro, Christian Brauner, Jan Kara,
linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Zbigniew Jędrzejewski-Szmek, Aleksa Sarai
On Fri, Sep 27, 2024 at 10:45:58AM -0500, Eric W. Biederman wrote:
> Tycho Andersen <tycho@tycho.pizza> writes:
>
> > From: Tycho Andersen <tandersen@netflix.com>
> >
> > Zbigniew mentioned at Linux Plumber's that systemd is interested in
> > switching to execveat() for service execution, but can't, because the
> > contents of /proc/pid/comm are the file descriptor which was used,
> > instead of the path to the binary. This makes the output of tools like
> > top and ps useless, especially in a world where most fds are opened
> > CLOEXEC so the number is truly meaningless.
> >
> > Change exec path to fix up /proc/pid/comm in the case where we have
> > allocated one of these synthetic paths in bprm_init(). This way the actual
> > exec machinery is unchanged, but cosmetically the comm looks reasonable to
> > admins investigating things.
>
> Perhaps change the subject to match the code.
>
> > Signed-off-by: Tycho Andersen <tandersen@netflix.com>
> > Suggested-by: Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
> > CC: Aleksa Sarai <cyphar@cyphar.com>
> > Link: https://github.com/uapi-group/kernel-features#set-comm-field-before-exec
> > ---
> > v2: * drop the flag, everyone :)
> > * change the rendered value to f_path.dentry->d_name.name instead of
> > argv[0], Eric
> > ---
> > fs/exec.c | 13 ++++++++++++-
> > 1 file changed, 12 insertions(+), 1 deletion(-)
> >
> > diff --git a/fs/exec.c b/fs/exec.c
> > index dad402d55681..9520359a8dcc 100644
> > --- a/fs/exec.c
> > +++ b/fs/exec.c
> > @@ -1416,7 +1416,18 @@ int begin_new_exec(struct linux_binprm * bprm)
> > set_dumpable(current->mm, SUID_DUMP_USER);
> >
> > perf_event_exec();
> > - __set_task_comm(me, kbasename(bprm->filename), true);
> > +
> > + /*
> > + * If fdpath was set, execveat() made up a path that will
> > + * probably not be useful to admins running ps or similar.
> > + * Let's fix it up to be something reasonable.
> > + */
> > + if (bprm->fdpath) {
> > + BUILD_BUG_ON(TASK_COMM_LEN > DNAME_INLINE_LEN);
> > + __set_task_comm(me, bprm->file->f_path.dentry->d_name.name, true);
>
> We can just do this regardless of bprm->fdpath.
>
> It will be a change of behavior on when executing symlinks and possibly
> mount points but I don't think we care. If we do then we can add make
> it conditional with "if (bprm->fdpath)"
>
> At the very least using the above version unconditionally ought to flush
> out any bugs.
I'm not super comfortable doing this regardless of bprm->fdpath; that
seems like too many cases getting changed. Can we just leave it as
depending on bprm->fdpath?
Also, is d_name.name always going to be set? e.g. what about memfd, etc?
--
Kees Cook
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm
[not found] ` <87bk05vobx.fsf@email.froward.int.ebiederm.org>
@ 2024-09-30 20:10 ` Eric W. Biederman
2024-10-01 13:43 ` Tycho Andersen
0 siblings, 1 reply; 6+ messages in thread
From: Eric W. Biederman @ 2024-09-30 20:10 UTC (permalink / raw)
To: Kees Cook
Cc: Tycho Andersen, Alexander Viro, Christian Brauner, Jan Kara,
linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Zbigniew Jędrzejewski-Szmek, Aleksa Sarai
"Eric W. Biederman" <ebiederm@xmission.com> writes:
> Kees Cook <kees@kernel.org> writes:
>> I'm not super comfortable doing this regardless of bprm->fdpath; that
>> seems like too many cases getting changed. Can we just leave it as
>> depending on bprm->fdpath?
I was recommending that because I did not expect that there was any
widespread usage of aliasing of binary names using symlinks.
I realized today that on debian there are many aliases
of binaries created with the /etc/alternatives mechanism.
So there is much wider exposure to problems than I would have
supposed.
So I remove any objections to making the new code conditional on bprm->fdpath.
Eric
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm
2024-09-30 20:10 ` Eric W. Biederman
@ 2024-10-01 13:43 ` Tycho Andersen
0 siblings, 0 replies; 6+ messages in thread
From: Tycho Andersen @ 2024-10-01 13:43 UTC (permalink / raw)
To: Eric W. Biederman
Cc: Kees Cook, Alexander Viro, Christian Brauner, Jan Kara,
linux-fsdevel, linux-mm, linux-kernel, linux-kselftest,
Tycho Andersen, Zbigniew Jędrzejewski-Szmek, Aleksa Sarai
On Mon, Sep 30, 2024 at 03:10:29PM -0500, Eric W. Biederman wrote:
> "Eric W. Biederman" <ebiederm@xmission.com> writes:
>
> > Kees Cook <kees@kernel.org> writes:
>
> >> I'm not super comfortable doing this regardless of bprm->fdpath; that
> >> seems like too many cases getting changed. Can we just leave it as
> >> depending on bprm->fdpath?
>
> I was recommending that because I did not expect that there was any
> widespread usage of aliasing of binary names using symlinks.
>
> I realized today that on debian there are many aliases
> of binaries created with the /etc/alternatives mechanism.
> So there is much wider exposure to problems than I would have
> supposed.
>
> So I remove any objections to making the new code conditional on bprm->fdpath.
Yep, and it looks like Alpine distributes busybox with symlinks
instead of hard links. I will respin with a fixed subject line shortly.
Thanks,
Tycho
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2024-10-01 13:43 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-09-27 15:17 [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Tycho Andersen
2024-09-27 15:17 ` [PATCH v2 2/2] selftests/exec: add a test to enforce execveat()'s comm Tycho Andersen
2024-09-27 15:45 ` [PATCH v2 1/2] exec: add a flag for "reasonable" execveat() comm Eric W. Biederman
2024-09-28 21:56 ` Kees Cook
[not found] ` <87bk05vobx.fsf@email.froward.int.ebiederm.org>
2024-09-30 20:10 ` Eric W. Biederman
2024-10-01 13:43 ` Tycho Andersen
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).