Serge E. Hallyn [serue@xxxxxxxxxx] wrote: | Quoting Serge E. Hallyn (serue@xxxxxxxxxx): | > Quoting Sukadev Bhattiprolu (sukadev@xxxxxxxxxxxxxxxxxx): | > | > [From patch 2] | > | > > @@ -222,9 +222,16 @@ int __f_setown(struct file *filp, struct pid *pid, enum pid_type type, | > > if (err) | > > return err; | > > | > > - f_modown(filp, pid, type, current_uid(), current_euid(), force); | > > + f_modown(filp, pid, type, uid, euid, force); | > > return 0; | > > } | > > + | > > +int __f_setown(struct file *filp, struct pid *pid, enum pid_type type, | > > + int force) | > > +{ | > > + return __f_setown_uid(filp, pid, type, current_uid(), current_euid(), | > > + force); | > > +} | > > EXPORT_SYMBOL(__f_setown); | > | > [From patch 4] | > | > > + /* | > > + * TODO: Do we need to force==1 or can it be 0 ? 'force' is used to | > > + * modify the owner, if one is already set. Can it be set when | > > + * we restart an application ? | > > + */ | > > + ret = __f_setown_uid(file, pid, h->f_owner_pid_type, h->f_owner_uid, | > > + h->f_owner_euid, 1); | > > + rcu_read_unlock(); | > | > I think you need to modify how __f_setown() is calling | > security_file_set_fowner(). Though I guess noone looks at the | > current_uid(), so maybe it's not so important at this point. | > | > (I do wonder whether converting fowner to using a struct cred | > is the way to go) | | Well you can probably skip LSM implications at this point. | | But I'm worried about the fact that you do no check on uid here. | Note that now if a signal is to be sent, fown->pid will | get signal fow->signum sent by fown->uid. So this looks like | a way for an unprivileged task to use root privs to kill a | task he shouldn't be able to. Yes, the uid should not be trusted since the checkpoint image can be tampered. Matt pointed it out too. The process P1 that called fcntl(F_SETOWN) may have exited and hence may not in the checkpoint-image. So during restart, some other process will need to act for P1. Would requiring CAP_SETUID, like we do for restoring creds be an overkill ? _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/containers