Skip to content

Commit f8a00ce

Browse files
thejhgregkh
authored andcommitted
proc: restrict kernel stack dumps to root
Currently, you can use /proc/self/task/*/stack to cause a stack walk on a task you control while it is running on another CPU. That means that the stack can change under the stack walker. The stack walker does have guards against going completely off the rails and into random kernel memory, but it can interpret random data from your kernel stack as instruction pointers and stack pointers. This can cause exposure of kernel stack contents to userspace. Restrict the ability to inspect kernel stacks of arbitrary tasks to root in order to prevent a local attacker from exploiting racy stack unwinding to leak kernel task stack contents. See the added comment for a longer rationale. There don't seem to be any users of this userspace API that can't gracefully bail out if reading from the file fails. Therefore, I believe that this change is unlikely to break things. In the case that this patch does end up needing a revert, the next-best solution might be to fake a single-entry stack based on wchan. Link: http://lkml.kernel.org/r/20180927153316.200286-1-jannh@google.com Fixes: 2ec220e ("proc: add /proc/*/stack") Signed-off-by: Jann Horn <jannh@google.com> Acked-by: Kees Cook <keescook@chromium.org> Cc: Alexey Dobriyan <adobriyan@gmail.com> Cc: Ken Chen <kenchen@google.com> Cc: Will Deacon <will.deacon@arm.com> Cc: Laura Abbott <labbott@redhat.com> Cc: Andy Lutomirski <luto@amacapital.net> Cc: Catalin Marinas <catalin.marinas@arm.com> Cc: Josh Poimboeuf <jpoimboe@redhat.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Ingo Molnar <mingo@redhat.com> Cc: "H . Peter Anvin" <hpa@zytor.com> Cc: <stable@vger.kernel.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
1 parent 20916d4 commit f8a00ce

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

fs/proc/base.c

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -407,6 +407,20 @@ static int proc_pid_stack(struct seq_file *m, struct pid_namespace *ns,
407407
unsigned long *entries;
408408
int err;
409409

410+
/*
411+
* The ability to racily run the kernel stack unwinder on a running task
412+
* and then observe the unwinder output is scary; while it is useful for
413+
* debugging kernel issues, it can also allow an attacker to leak kernel
414+
* stack contents.
415+
* Doing this in a manner that is at least safe from races would require
416+
* some work to ensure that the remote task can not be scheduled; and
417+
* even then, this would still expose the unwinder as local attack
418+
* surface.
419+
* Therefore, this interface is restricted to root.
420+
*/
421+
if (!file_ns_capable(m->file, &init_user_ns, CAP_SYS_ADMIN))
422+
return -EACCES;
423+
410424
entries = kmalloc_array(MAX_STACK_TRACE_DEPTH, sizeof(*entries),
411425
GFP_KERNEL);
412426
if (!entries)

0 commit comments

Comments
 (0)