Allow procstat to view current working directory? [xfce4-terminal, linprocfs, ...]

Konstantin Belousov kib at freebsd.org
Wed May 6 21:46:27 UTC 2020


On Wed, May 06, 2020 at 08:32:08PM +0200, Damjan Jovanovic wrote:
> Hi
> 
> Currently "procstat fd [pid]" cannot view anything, even for other
> processes owned by the user making the call, not even their current working
> directory (CWD), unless it has PGET_CANDEBUG permission.
> 
> linprocfs however allows reading the CWD for any process because it doesn't
> perform that check (sys/compat/linprocfs/linprocfs.c, function
> linprocfs_doproccwd()).
> 
> Applications use this, eg. xfce4-terminal relies on
> /compat/linux/proc/<pid>/cwd to find the shell's CWD, so that when you open
> a new tab, it starts in the same CWD as the tab you opened it from (
> https://github.com/xfce-mirror/xfce4-terminal/blob/master/terminal/terminal-screen.c#L2343).
> I would like to patch xfce4-terminal to use libprocstat for that instead of
> needing linprocfs to be mounted, but since procstat is more restrictive, it
> will break it.
> 
> Can we please downgrade PGET_CANDEBUG to at least PGET_CANSEE, so you can
> view the CWD for processes you own? Maybe other open files still need to be
> hidden, but the CWD doesn't seem like a major security concern.
Can you explain why CANDEBUG vs CANSEE matters for your case ?
Or better, why xfce4-terminal cannot debug shells it spawns ?
Is it suid ?

My initial reaction was that linprocfs should be patched to match FreeBSD
native behaviour instead.

> 
> Linux's own /proc filesystem never hides the CWD (lrwxrwxrwx), and only
> hides file descriptors for processes you don't own.
> 
> A patch along the following lines could be a start:
> 
> diff --git a/sys/kern/kern_descrip.c b/sys/kern/kern_descrip.c
> index 423968b2e1cc..f487232d2cff 100644
> --- a/sys/kern/kern_descrip.c
> +++ b/sys/kern/kern_descrip.c
> @@ -3692,7 +3692,7 @@ sysctl_kern_proc_filedesc(SYSCTL_HANDLER_ARGS)
> 
>         sbuf_new_for_sysctl(&sb, NULL, FILEDESC_SBUF_SIZE, req);
>         sbuf_clear_flags(&sb, SBUF_INCLUDENUL);
> -   error = pget((pid_t)name[0], PGET_CANDEBUG | PGET_NOTWEXIT, &p);
> + error = pget((pid_t)name[0], PGET_CANSEE | PGET_NOTWEXIT, &p);
>         if (error != 0) {
>                 sbuf_delete(&sb);
>                 return (error);
> @@ -3768,7 +3768,7 @@ sysctl_kern_proc_ofiledesc(SYSCTL_HANDLER_ARGS)
>         struct proc *p;
> 
>         name = (int *)arg1;
> -   error = pget((pid_t)name[0], PGET_CANDEBUG | PGET_NOTWEXIT, &p);
> + error = pget((pid_t)name[0], PGET_CANSEE | PGET_NOTWEXIT, &p);
>         if (error != 0)
>                 return (error);
>         fdp = fdhold(p);
> 
> 
> 
> 
> Thank you
> Damjan
> _______________________________________________
> freebsd-hackers at freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe at freebsd.org"


More information about the freebsd-hackers mailing list