On Tue, Mar 1, 2022 at 5:15 AM Mickaël Salaün <mic@xxxxxxxxxxx> wrote: > On 01/03/2022 10:22, Christian Brauner wrote: > > On Mon, Feb 28, 2022 at 10:59:35PM +0100, Mickaël Salaün wrote: > >> From: Mickaël Salaün <mic@xxxxxxxxxxxxxxxxxxx> > >> > >> While transitionning to ACC_MODE() with commit 5300990c0370 ("Sanitize > >> f_flags helpers") and then fixing it with commit 6d125529c6cb ("Fix > >> ACC_MODE() for real"), we lost an open flags consistency check. Opening > >> a file with O_WRONLY | O_RDWR leads to an f_flags containing MAY_READ | > >> MAY_WRITE (thanks to the ACC_MODE() helper) and an empty f_mode. > >> Indeed, the OPEN_FMODE() helper transforms 3 (an incorrect value) to 0. > >> > >> Fortunately, vfs_read() and vfs_write() both check for FMODE_READ, or > >> respectively FMODE_WRITE, and return an EBADF error if it is absent. > >> Before commit 5300990c0370 ("Sanitize f_flags helpers"), opening a file > >> with O_WRONLY | O_RDWR returned an EINVAL error. Let's restore this safe > >> behavior. > > > > That specific part seems a bit risky at first glance. Given that the > > patch referenced is from 2009 this means we've been allowing O_WRONLY | > > O_RDWR to succeed for almost 13 years now. > > Yeah, it's an old bug, but we should keep in mind that a file descriptor > created with such flags cannot be used to read nor write. However, > unfortunately, it can be used for things like ioctl, fstat, chdir… I > don't know if there is any user of this trick. > > Either way, there is an inconsistency between those using ACC_MODE() and > those using OPEN_FMODE(). If we decide to take a side for the behavior > of one or the other, without denying to create such FD, it could also > break security policies. We have to choose what to potentially break… I'm not really liking the idea that the empty/0 f_mode field leads to SELinux doing an ioctl access check as opposed to the expected read|write check. Yes, other parts of the code catch the problem, but this is bad from a SELinux perspective. Looking quickly at the other LSMs, it would appear that other LSMs are affected as well. If we're not going to fix file::f_mode, the LSMs probably need to consider using file::f_flags directly in conjunction with a correct OPEN_FMODE() macro (or better yet a small inline function that isn't as ugly). -- paul-moore.com