on 2022/4/22 17:47, Christian Brauner wrote: > On Fri, Apr 22, 2022 at 06:03:09AM +0000, xuyang2018.jy@xxxxxxxxxxx wrote: >> on 2022/4/21 16:35, Christian Brauner wrote: >>> On Thu, Apr 21, 2022 at 03:54:17PM +0800, Yang Xu wrote: >>>> Currently, vfs only passes mode argument to filesystem, then use inode_init_owner() >>>> to strip S_ISGID. Some filesystem(ie ext4/btrfs) will call inode_init_owner >>>> firstly, then posxi acl setup, but xfs uses the contrary order. It will >>>> affect S_ISGID clear especially we filter S_IXGRP by umask or acl. >>>> >>>> Regardless of which filesystem is in use, failure to strip the SGID correctly >>>> is considered a security failure that needs to be fixed. The current VFS >>>> infrastructure requires the filesystem to do everything right and not step on >>>> any landmines to strip the SGID bit, when in fact it can easily be done at the >>>> VFS and the filesystems then don't even need to be aware that the SGID needs >>>> to be (or has been stripped) by the operation the user asked to be done. >>>> >>>> Vfs has all the info it needs - it doesn't need the filesystems to do everything >>>> correctly with the mode and ensuring that they order things like posix acl setup >>>> functions correctly with inode_init_owner() to strip the SGID bit. >>>> >>>> Just strip the SGID bit at the VFS, and then the filesystem can't get it wrong. >>>> >>>> Also, the inode_sgid_strip() api should be used before IS_POSIXACL() because >>>> this api may change mode. >>>> >>>> Only the following places use inode_init_owner >>>> " >>>> arch/powerpc/platforms/cell/spufs/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode | S_IFDIR); >>>> arch/powerpc/platforms/cell/spufs/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode | S_IFDIR); >>>> fs/9p/vfs_inode.c: inode_init_owner(&init_user_ns, inode, NULL, mode); >>>> fs/bfs/dir.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/btrfs/inode.c: inode_init_owner(mnt_userns, inode, dir, mode); >>>> fs/btrfs/tests/btrfs-tests.c: inode_init_owner(&init_user_ns, inode, NULL, S_IFREG); >>>> fs/ext2/ialloc.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/ext4/ialloc.c: inode_init_owner(mnt_userns, inode, dir, mode); >>>> fs/f2fs/namei.c: inode_init_owner(mnt_userns, inode, dir, mode); >>>> fs/hfsplus/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/hugetlbfs/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/jfs/jfs_inode.c: inode_init_owner(&init_user_ns, inode, parent, mode); >>>> fs/minix/bitmap.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/nilfs2/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/ntfs3/inode.c: inode_init_owner(mnt_userns, inode, dir, mode); >>>> fs/ocfs2/dlmfs/dlmfs.c: inode_init_owner(&init_user_ns, inode, NULL, mode); >>>> fs/ocfs2/dlmfs/dlmfs.c: inode_init_owner(&init_user_ns, inode, parent, mode); >>>> fs/ocfs2/namei.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/omfs/inode.c: inode_init_owner(&init_user_ns, inode, NULL, mode); >>>> fs/overlayfs/dir.c: inode_init_owner(&init_user_ns, inode, dentry->d_parent->d_inode, mode); >>>> fs/ramfs/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/reiserfs/namei.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/sysv/ialloc.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/ubifs/dir.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/udf/ialloc.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/ufs/ialloc.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> fs/xfs/xfs_inode.c: inode_init_owner(mnt_userns, inode, dir, mode); >>>> fs/zonefs/super.c: inode_init_owner(&init_user_ns, inode, parent, S_IFDIR | 0555); >>>> kernel/bpf/inode.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> mm/shmem.c: inode_init_owner(&init_user_ns, inode, dir, mode); >>>> " >>>> >>>> They are used in filesystem to init new inode function and these init inode >>>> functions are used by following operations: >>>> mkdir >>>> symlink >>>> mknod >>>> create >>>> tmpfile >>>> rename >>>> >>>> We don't care about mkdir because we don't strip SGID bit for directory except >>>> fs.xfs.irix_sgid_inherit. But we even call prepare_mode() in do_mkdirat() since >>>> inode_sgid_strip() will skip directories anyway. This will enforce the same >>>> ordering for all relevant operations and it will make the code more uniform and >>>> easier to understand by using new helper prepare_mode(). >>>> >>>> symlink and rename only use valid mode that doesn't have SGID bit. >>>> >>>> We have added inode_sgid_strip api for the remaining operations. >>>> >>>> In addition to the above six operations, four filesystems has a little difference >>>> 1) btrfs has btrfs_create_subvol_root to create new inode but used non SGID bit >>>> mode and can ignore >>>> 2) ocfs2 reflink function should add inode_sgid_strip api manually because we >>>> don't add it in vfs >>>> 3) spufs which doesn't really go hrough the regular VFS callpath because it has >>>> separate system call spu_create, but it t only allows the creation of >>>> directories and only allows bits in 0777 and can ignore >>>> 4) bpf use vfs_mkobj in bpf_obj_do_pin with >>>> "S_IFREG | ((S_IRUSR | S_IWUSR)& ~current_umask()) mode and >>>> use bpf_mkobj_ops in bpf_iter_link_pin_kernel with S_IFREG | S_IRUSR mode, >>>> so bpf is also not affected >>>> >>>> This patch also changed grpid behaviour for ext4/xfs because the mode passed to >>>> them may been changed by inode_sgid_strip. >>>> >>>> Also as Christian Brauner said" >>>> The patch itself is useful as it would move a security sensitive operation that is >>>> currently burried in individual filesystems into the vfs layer. But it has a decent >>>> regression potential since it might strip filesystems that have so far relied on >>>> getting the S_ISGID bit with a mode argument. So this needs a lot of testing and >>>> long exposure in -next for at least one full kernel cycle." >>>> >>>> Suggested-by: Dave Chinner<david@xxxxxxxxxxxxx> >>>> Signed-off-by: Yang Xu<xuyang2018.jy@xxxxxxxxxxx> >>>> --- >>>> v4->v5: >>>> put inode_sgid_strip before the inode_init_owner in ocfs2 filesystem >>>> because the inode->i_mode's assignment is in inode_init_owner >>>> fs/inode.c | 2 -- >>>> fs/namei.c | 22 +++++++++------------- >>>> fs/ocfs2/namei.c | 1 + >>>> include/linux/fs.h | 11 +++++++++++ >>>> 4 files changed, 21 insertions(+), 15 deletions(-) >>>> >>>> diff --git a/fs/inode.c b/fs/inode.c >>>> index 57130e4ef8b4..95667e634bd4 100644 >>>> --- a/fs/inode.c >>>> +++ b/fs/inode.c >>>> @@ -2246,8 +2246,6 @@ void inode_init_owner(struct user_namespace *mnt_userns, struct inode *inode, >>>> /* Directories are special, and always inherit S_ISGID */ >>>> if (S_ISDIR(mode)) >>>> mode |= S_ISGID; >>>> - else >>>> - mode = inode_sgid_strip(mnt_userns, dir, mode); >>>> } else >>>> inode_fsgid_set(inode, mnt_userns); >>>> inode->i_mode = mode; >>>> diff --git a/fs/namei.c b/fs/namei.c >>>> index 73646e28fae0..5b8e6288d503 100644 >>>> --- a/fs/namei.c >>>> +++ b/fs/namei.c >>>> @@ -3287,8 +3287,7 @@ static struct dentry *lookup_open(struct nameidata *nd, struct file *file, >>>> if (open_flag& O_CREAT) { >>>> if (open_flag& O_EXCL) >>>> open_flag&= ~O_TRUNC; >>>> - if (!IS_POSIXACL(dir->d_inode)) >>>> - mode&= ~current_umask(); >>>> + mode = prepare_mode(mnt_userns, dir->d_inode, mode); >>>> if (likely(got_write)) >>>> create_error = may_o_create(mnt_userns,&nd->path, >>>> dentry, mode); >>>> @@ -3521,8 +3520,7 @@ struct dentry *vfs_tmpfile(struct user_namespace *mnt_userns, >>>> child = d_alloc(dentry,&slash_name); >>>> if (unlikely(!child)) >>>> goto out_err; >>>> - if (!IS_POSIXACL(dir)) >>>> - mode&= ~current_umask(); >>>> + mode = prepare_mode(mnt_userns, dir, mode); >>>> error = dir->i_op->tmpfile(mnt_userns, dir, child, mode); >>>> if (error) >>>> goto out_err; >>>> @@ -3850,13 +3848,12 @@ static int do_mknodat(int dfd, struct filename *name, umode_t mode, >>>> if (IS_ERR(dentry)) >>>> goto out1; >>>> >>>> - if (!IS_POSIXACL(path.dentry->d_inode)) >>>> - mode&= ~current_umask(); >>>> + mnt_userns = mnt_user_ns(path.mnt); >>>> + mode = prepare_mode(mnt_userns, path.dentry->d_inode, mode); >>>> error = security_path_mknod(&path, dentry, mode, dev); >>>> if (error) >>>> goto out2; >>>> >>>> - mnt_userns = mnt_user_ns(path.mnt); >>>> switch (mode& S_IFMT) { >>>> case 0: case S_IFREG: >>>> error = vfs_create(mnt_userns, path.dentry->d_inode, >>>> @@ -3943,6 +3940,7 @@ int do_mkdirat(int dfd, struct filename *name, umode_t mode) >>>> struct path path; >>>> int error; >>>> unsigned int lookup_flags = LOOKUP_DIRECTORY; >>>> + struct user_namespace *mnt_userns; >>>> >>>> retry: >>>> dentry = filename_create(dfd, name,&path, lookup_flags); >>>> @@ -3950,15 +3948,13 @@ int do_mkdirat(int dfd, struct filename *name, umode_t mode) >>>> if (IS_ERR(dentry)) >>>> goto out_putname; >>>> >>>> - if (!IS_POSIXACL(path.dentry->d_inode)) >>>> - mode&= ~current_umask(); >>>> + mnt_userns = mnt_user_ns(path.mnt); >>>> + mode = prepare_mode(mnt_userns, path.dentry->d_inode, mode); >>>> error = security_path_mkdir(&path, dentry, mode); >>>> - if (!error) { >>>> - struct user_namespace *mnt_userns; >>>> - mnt_userns = mnt_user_ns(path.mnt); >>>> + if (!error) >>>> error = vfs_mkdir(mnt_userns, path.dentry->d_inode, dentry, >>>> mode); >>>> - } >>>> + >>>> done_path_create(&path, dentry); >>>> if (retry_estale(error, lookup_flags)) { >>>> lookup_flags |= LOOKUP_REVAL; >>>> diff --git a/fs/ocfs2/namei.c b/fs/ocfs2/namei.c >>>> index c75fd54b9185..21f3da2e66c9 100644 >>>> --- a/fs/ocfs2/namei.c >>>> +++ b/fs/ocfs2/namei.c >>>> @@ -197,6 +197,7 @@ static struct inode *ocfs2_get_init_inode(struct inode *dir, umode_t mode) >>>> * callers. */ >>>> if (S_ISDIR(mode)) >>>> set_nlink(inode, 2); >>>> + mode = inode_sgid_strip(&init_user_ns, dir, mode); >>>> inode_init_owner(&init_user_ns, inode, dir, mode); >>> >>> For the record, I'm not too fond of this separate invocation of >>> inode_sgid_strip() but since it's only one location this might be fine. >>> If there's more than one location a separate helper should exist for >>> this that abstracts this away for the filesystem. >> Agree. This case only be found when using OCFS2_IOC_REFLINK ioctl. And > > (I have one very minor non-technical ask: can you please make sure to > leave an empty line between the text you're citing and your reply? It > would make reading your replies a lot easier. :)) Of course. > >> other support reflink filesystem(xfs, btrfs) they use FICLONE or >> FICLONERANGE ioctl. >> >> Since ocfs2 has supported reflink by using it remap_file_range, should >> we still need this ioctl? >> >> commit bd50873dc725a9fa72592ecc986c58805e823051 >> Author: Tao Ma<tao.ma@xxxxxxxxxx> >> Date: Mon Sep 21 11:25:14 2009 +0800 >> >> ocfs2: Add ioctl for reflink. >> >> The ioctl will take 3 parameters: old_path, new_path and >> preserve and call vfs_reflink. It is useful when we backport >> reflink features to old kernels. >> >> Signed-off-by: Tao Ma<tao.ma@xxxxxxxxxx> >> >> Of course, this is a problem doesn't belong to this series. >> >>> >>> Two questions: >>> - Sould this call prepare_mode(), i.e. should we honor umasks here too? >> IMO, it desn't need to honor umask. Because reflink only will update >> inode_imode by setattr to strip S_ISGID and S_ISUID instead of creating >> a file. > > I had a misconception here because I got confused by ocfs2. > While the OCFS2_IOC_REFLINK ioctl creates the target file itself and the > reflink the FICLONE and FICLONERANGE _only_ create the reflink. > > So the target file itself must've been created prior to > FICLONE/FICLONERANGE which means basic setgid stripping should've been > done when the file was created. Yes. > > Since ocfs2 reflink callpaths work very differently we can't switch it > to FICLONE/FICLONERANGE as this would regress ocfs2 users. > >>> - How is the sgid bit handled when creating reflinks on other reflink >>> supporting filesystems such as xfs and btrfs? >> xfstests has a test case generic/673 for this, so btrfs and xfs should >> have the same behavior. >> I look into xfs code. >> >> Firstly >> >> If we don't have CAP_FSETID and it is a regulre file,also have sgid bit, >> then should_remove_suid will give attr a ATTR_KILL_SGID mask. > > What you're referring to below is privilege stripping when _modifying > the content_ of set{g,u}id binaries. > > That happens e.g. during write() or indeed a reflink creation via > FICLONE/FICLONERANGE. For the latter privilege stripping happens when > only some extents are reflinked and not the whole file. So that's: > > * ioctl_file_clone() > * vfs_clone_file_range() > * do_clone_file_range() > * generic_file_rw_checks() > * remap_verify_area() > * security_file_permission() > * ->remap_file_range() [1] > > [1]: > btrfs: > * btrfs_remap_file_range() > * generic_remap_file_range_prep() > * file_modified() // privilege stripping > > ocfs2: > * ocfs2_remap_file_range() > * generic_remap_file_range_prep() > * file_modified() // privilege stripping > > xfs: > * xfs_remap_file_range() > * generic_remap_file_range_prep() > * file_modified() // privilege stripping > > // This is stacked, i.e. ovl filesystems will rely on the filesystem > // used for the upper mount and it's .remap_file_range() implementation. > overlayfs: > * ovl_remap_file_range() > * vfs_clone_file_range() > > The other two implementers are: > > cifs: > * cifs_remap_file_range() > > nfs: > * nfs42_remap_file_range() > > both of which don't call into generic_remap_file_range_prep() and so > file_modified() isn't called. But they are netfses and there's a server > involved. In general, this isn't really a concern for this patchset. > (But something to potentially to look into in the future.) > > And it wasn't what I was worried about. > > The crucial information that we needed was whether reflink callpaths > other than ocfs2 create files themselves and therefore might rely > implicitly on setgid stripping in inode_init_owner(). > > Now that we looked at all callers we can be confident that this isn't > the case. _Apart from ocfs2_ but which you handle in the patchset. If I understand correctly, this stripping code is ok. So can I send a v6 patch?