Re: [PATCH v5 3/4] fs: strip file's S_ISGID mode on vfs instead of on underlying filesystem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 22, 2022 at 10:13:52AM +0000, xuyang2018.jy@xxxxxxxxxxx wrote:
> on 2022/4/22 17:47, Christian Brauner wrote:
> > On Fri, Apr 22, 2022 at 06:03:09AM +0000, xuyang2018.jy@xxxxxxxxxxx wrote:
> >> on 2022/4/21 16:35, Christian Brauner wrote:
> >>> On Thu, Apr 21, 2022 at 03:54:17PM +0800, Yang Xu wrote:
> >>>> Currently, vfs only passes mode argument to filesystem, then use inode_init_owner()
> >>>> to strip S_ISGID. Some filesystem(ie ext4/btrfs) will call inode_init_owner
> >>>> firstly, then posxi acl setup, but xfs uses the contrary order. It will
> >>>> affect S_ISGID clear especially we filter S_IXGRP by umask or acl.
> >>>>
> >>>> Regardless of which filesystem is in use, failure to strip the SGID correctly
> >>>> is considered a security failure that needs to be fixed. The current VFS
> >>>> infrastructure requires the filesystem to do everything right and not step on
> >>>> any landmines to strip the SGID bit, when in fact it can easily be done at the
> >>>> VFS and the filesystems then don't even need to be aware that the SGID needs
> >>>> to be (or has been stripped) by the operation the user asked to be done.
> >>>>
> >>>> Vfs has all the info it needs - it doesn't need the filesystems to do everything
> >>>> correctly with the mode and ensuring that they order things like posix acl setup
> >>>> functions correctly with inode_init_owner() to strip the SGID bit.
> >>>>
> >>>> Just strip the SGID bit at the VFS, and then the filesystem can't get it wrong.
> >>>>
> >>>> Also, the inode_sgid_strip() api should be used before IS_POSIXACL() because
> >>>> this api may change mode.
> >>>>
> >>>> Only the following places use inode_init_owner
> >>>> "
> >>>> arch/powerpc/platforms/cell/spufs/inode.c:      inode_init_owner(&init_user_ns, inode, dir, mode | S_IFDIR);
> >>>> arch/powerpc/platforms/cell/spufs/inode.c:      inode_init_owner(&init_user_ns, inode, dir, mode | S_IFDIR);
> >>>> fs/9p/vfs_inode.c:      inode_init_owner(&init_user_ns, inode, NULL, mode);
> >>>> fs/bfs/dir.c:   inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/btrfs/inode.c:       inode_init_owner(mnt_userns, inode, dir, mode);
> >>>> fs/btrfs/tests/btrfs-tests.c:   inode_init_owner(&init_user_ns, inode, NULL, S_IFREG);
> >>>> fs/ext2/ialloc.c:               inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/ext4/ialloc.c:               inode_init_owner(mnt_userns, inode, dir, mode);
> >>>> fs/f2fs/namei.c:        inode_init_owner(mnt_userns, inode, dir, mode);
> >>>> fs/hfsplus/inode.c:     inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/hugetlbfs/inode.c:           inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/jfs/jfs_inode.c:     inode_init_owner(&init_user_ns, inode, parent, mode);
> >>>> fs/minix/bitmap.c:      inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/nilfs2/inode.c:      inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/ntfs3/inode.c:       inode_init_owner(mnt_userns, inode, dir, mode);
> >>>> fs/ocfs2/dlmfs/dlmfs.c:         inode_init_owner(&init_user_ns, inode, NULL, mode);
> >>>> fs/ocfs2/dlmfs/dlmfs.c: inode_init_owner(&init_user_ns, inode, parent, mode);
> >>>> fs/ocfs2/namei.c:       inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/omfs/inode.c:        inode_init_owner(&init_user_ns, inode, NULL, mode);
> >>>> fs/overlayfs/dir.c:     inode_init_owner(&init_user_ns, inode, dentry->d_parent->d_inode, mode);
> >>>> fs/ramfs/inode.c:               inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/reiserfs/namei.c:    inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/sysv/ialloc.c:       inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/ubifs/dir.c: inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/udf/ialloc.c:        inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/ufs/ialloc.c:        inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> fs/xfs/xfs_inode.c:             inode_init_owner(mnt_userns, inode, dir, mode);
> >>>> fs/zonefs/super.c:      inode_init_owner(&init_user_ns, inode, parent, S_IFDIR | 0555);
> >>>> kernel/bpf/inode.c:     inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> mm/shmem.c:             inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>> "
> >>>>
> >>>> They are used in filesystem to init new inode function and these init inode
> >>>> functions are used by following operations:
> >>>> mkdir
> >>>> symlink
> >>>> mknod
> >>>> create
> >>>> tmpfile
> >>>> rename
> >>>>
> >>>> We don't care about mkdir because we don't strip SGID bit for directory except
> >>>> fs.xfs.irix_sgid_inherit. But we even call prepare_mode() in do_mkdirat() since
> >>>> inode_sgid_strip() will skip directories anyway. This will enforce the same
> >>>> ordering for all relevant operations and it will make the code more uniform and
> >>>> easier to understand by using new helper prepare_mode().
> >>>>
> >>>> symlink and rename only use valid mode that doesn't have SGID bit.
> >>>>
> >>>> We have added inode_sgid_strip api for the remaining operations.
> >>>>
> >>>> In addition to the above six operations, four filesystems has a little difference
> >>>> 1) btrfs has btrfs_create_subvol_root to create new inode but used non SGID bit
> >>>>      mode and can ignore
> >>>> 2) ocfs2 reflink function should add inode_sgid_strip api manually because we
> >>>>      don't add it in vfs
> >>>> 3) spufs which doesn't really go hrough the regular VFS callpath because it has
> >>>>      separate system call spu_create, but it t only allows the creation of
> >>>>      directories and only allows bits in 0777 and can ignore
> >>>> 4) bpf use vfs_mkobj in bpf_obj_do_pin with
> >>>>      "S_IFREG | ((S_IRUSR | S_IWUSR)&   ~current_umask()) mode and
> >>>>      use bpf_mkobj_ops in bpf_iter_link_pin_kernel with S_IFREG | S_IRUSR mode,
> >>>>      so bpf is also not affected
> >>>>
> >>>> This patch also changed grpid behaviour for ext4/xfs because the mode passed to
> >>>> them may been changed by inode_sgid_strip.
> >>>>
> >>>> Also as Christian Brauner said"
> >>>> The patch itself is useful as it would move a security sensitive operation that is
> >>>> currently burried in individual filesystems into the vfs layer. But it has a decent
> >>>> regression  potential since it might strip filesystems that have so far relied on
> >>>> getting the S_ISGID bit with a mode argument. So this needs a lot of testing and
> >>>> long exposure in -next for at least one full kernel cycle."
> >>>>
> >>>> Suggested-by: Dave Chinner<david@xxxxxxxxxxxxx>
> >>>> Signed-off-by: Yang Xu<xuyang2018.jy@xxxxxxxxxxx>
> >>>> ---
> >>>> v4->v5:
> >>>> put inode_sgid_strip before the inode_init_owner in ocfs2 filesystem
> >>>> because the inode->i_mode's assignment is in inode_init_owner
> >>>>    fs/inode.c         |  2 --
> >>>>    fs/namei.c         | 22 +++++++++-------------
> >>>>    fs/ocfs2/namei.c   |  1 +
> >>>>    include/linux/fs.h | 11 +++++++++++
> >>>>    4 files changed, 21 insertions(+), 15 deletions(-)
> >>>>
> >>>> diff --git a/fs/inode.c b/fs/inode.c
> >>>> index 57130e4ef8b4..95667e634bd4 100644
> >>>> --- a/fs/inode.c
> >>>> +++ b/fs/inode.c
> >>>> @@ -2246,8 +2246,6 @@ void inode_init_owner(struct user_namespace *mnt_userns, struct inode *inode,
> >>>>    		/* Directories are special, and always inherit S_ISGID */
> >>>>    		if (S_ISDIR(mode))
> >>>>    			mode |= S_ISGID;
> >>>> -		else
> >>>> -			mode = inode_sgid_strip(mnt_userns, dir, mode);
> >>>>    	} else
> >>>>    		inode_fsgid_set(inode, mnt_userns);
> >>>>    	inode->i_mode = mode;
> >>>> diff --git a/fs/namei.c b/fs/namei.c
> >>>> index 73646e28fae0..5b8e6288d503 100644
> >>>> --- a/fs/namei.c
> >>>> +++ b/fs/namei.c
> >>>> @@ -3287,8 +3287,7 @@ static struct dentry *lookup_open(struct nameidata *nd, struct file *file,
> >>>>    	if (open_flag&   O_CREAT) {
> >>>>    		if (open_flag&   O_EXCL)
> >>>>    			open_flag&= ~O_TRUNC;
> >>>> -		if (!IS_POSIXACL(dir->d_inode))
> >>>> -			mode&= ~current_umask();
> >>>> +		mode = prepare_mode(mnt_userns, dir->d_inode, mode);
> >>>>    		if (likely(got_write))
> >>>>    			create_error = may_o_create(mnt_userns,&nd->path,
> >>>>    						    dentry, mode);
> >>>> @@ -3521,8 +3520,7 @@ struct dentry *vfs_tmpfile(struct user_namespace *mnt_userns,
> >>>>    	child = d_alloc(dentry,&slash_name);
> >>>>    	if (unlikely(!child))
> >>>>    		goto out_err;
> >>>> -	if (!IS_POSIXACL(dir))
> >>>> -		mode&= ~current_umask();
> >>>> +	mode = prepare_mode(mnt_userns, dir, mode);
> >>>>    	error = dir->i_op->tmpfile(mnt_userns, dir, child, mode);
> >>>>    	if (error)
> >>>>    		goto out_err;
> >>>> @@ -3850,13 +3848,12 @@ static int do_mknodat(int dfd, struct filename *name, umode_t mode,
> >>>>    	if (IS_ERR(dentry))
> >>>>    		goto out1;
> >>>>
> >>>> -	if (!IS_POSIXACL(path.dentry->d_inode))
> >>>> -		mode&= ~current_umask();
> >>>> +	mnt_userns = mnt_user_ns(path.mnt);
> >>>> +	mode = prepare_mode(mnt_userns, path.dentry->d_inode, mode);
> >>>>    	error = security_path_mknod(&path, dentry, mode, dev);
> >>>>    	if (error)
> >>>>    		goto out2;
> >>>>
> >>>> -	mnt_userns = mnt_user_ns(path.mnt);
> >>>>    	switch (mode&   S_IFMT) {
> >>>>    		case 0: case S_IFREG:
> >>>>    			error = vfs_create(mnt_userns, path.dentry->d_inode,
> >>>> @@ -3943,6 +3940,7 @@ int do_mkdirat(int dfd, struct filename *name, umode_t mode)
> >>>>    	struct path path;
> >>>>    	int error;
> >>>>    	unsigned int lookup_flags = LOOKUP_DIRECTORY;
> >>>> +	struct user_namespace *mnt_userns;
> >>>>
> >>>>    retry:
> >>>>    	dentry = filename_create(dfd, name,&path, lookup_flags);
> >>>> @@ -3950,15 +3948,13 @@ int do_mkdirat(int dfd, struct filename *name, umode_t mode)
> >>>>    	if (IS_ERR(dentry))
> >>>>    		goto out_putname;
> >>>>
> >>>> -	if (!IS_POSIXACL(path.dentry->d_inode))
> >>>> -		mode&= ~current_umask();
> >>>> +	mnt_userns = mnt_user_ns(path.mnt);
> >>>> +	mode = prepare_mode(mnt_userns, path.dentry->d_inode, mode);
> >>>>    	error = security_path_mkdir(&path, dentry, mode);
> >>>> -	if (!error) {
> >>>> -		struct user_namespace *mnt_userns;
> >>>> -		mnt_userns = mnt_user_ns(path.mnt);
> >>>> +	if (!error)
> >>>>    		error = vfs_mkdir(mnt_userns, path.dentry->d_inode, dentry,
> >>>>    				  mode);
> >>>> -	}
> >>>> +
> >>>>    	done_path_create(&path, dentry);
> >>>>    	if (retry_estale(error, lookup_flags)) {
> >>>>    		lookup_flags |= LOOKUP_REVAL;
> >>>> diff --git a/fs/ocfs2/namei.c b/fs/ocfs2/namei.c
> >>>> index c75fd54b9185..21f3da2e66c9 100644
> >>>> --- a/fs/ocfs2/namei.c
> >>>> +++ b/fs/ocfs2/namei.c
> >>>> @@ -197,6 +197,7 @@ static struct inode *ocfs2_get_init_inode(struct inode *dir, umode_t mode)
> >>>>    	 * callers. */
> >>>>    	if (S_ISDIR(mode))
> >>>>    		set_nlink(inode, 2);
> >>>> +	mode = inode_sgid_strip(&init_user_ns, dir, mode);
> >>>>    	inode_init_owner(&init_user_ns, inode, dir, mode);
> >>>
> >>> For the record, I'm not too fond of this separate invocation of
> >>> inode_sgid_strip() but since it's only one location this might be fine.
> >>> If there's more than one location a separate helper should exist for
> >>> this that abstracts this away for the filesystem.
> >> Agree. This case only be found when using OCFS2_IOC_REFLINK ioctl. And
> >
> > (I have one very minor non-technical ask: can you please make sure to
> > leave an empty line between the text you're citing and your reply? It
> > would make reading your replies a lot easier. :))
> 
> Of course.
> 
> >
> >> other support reflink filesystem(xfs, btrfs) they use  FICLONE or
> >> FICLONERANGE ioctl.
> >>
> >> Since ocfs2 has supported reflink by using it remap_file_range, should
> >> we still need this ioctl?
> >>
> >> commit bd50873dc725a9fa72592ecc986c58805e823051
> >> Author: Tao Ma<tao.ma@xxxxxxxxxx>
> >> Date:   Mon Sep 21 11:25:14 2009 +0800
> >>
> >>       ocfs2: Add ioctl for reflink.
> >>
> >>       The ioctl will take 3 parameters: old_path, new_path and
> >>       preserve and call vfs_reflink. It is useful when we backport
> >>       reflink features to old kernels.
> >>
> >>       Signed-off-by: Tao Ma<tao.ma@xxxxxxxxxx>
> >>
> >> Of course, this is a problem doesn't belong to this series.
> >>
> >>>
> >>> Two questions:
> >>> - Sould this call prepare_mode(), i.e. should we honor umasks here too?
> >> IMO, it desn't need to honor umask. Because reflink only will update
> >> inode_imode by setattr to strip S_ISGID and S_ISUID instead of creating
> >> a file.
> >
> > I had a misconception here because I got confused by ocfs2.
> > While the OCFS2_IOC_REFLINK ioctl creates the target file itself and the
> > reflink the FICLONE and FICLONERANGE _only_ create the reflink.
> >
> > So the target file itself must've been created prior to
> > FICLONE/FICLONERANGE which means basic setgid stripping should've been
> > done when the file was created.
> 
> Yes.
> 
> >
> > Since ocfs2 reflink callpaths work very differently we can't switch it
> > to FICLONE/FICLONERANGE as this would regress ocfs2 users.
> >
> >>> - How is the sgid bit handled when creating reflinks on other reflink
> >>>     supporting filesystems such as xfs and btrfs?
> >> xfstests has a test case generic/673 for this, so btrfs and xfs should
> >> have the same behavior.
> >> I look into xfs code.
> >>
> >> Firstly
> >>
> >> If we don't have CAP_FSETID and it is a regulre file,also have sgid bit,
> >> then should_remove_suid will give attr a ATTR_KILL_SGID mask.
> >
> > What you're referring to below is privilege stripping when _modifying
> > the content_ of set{g,u}id binaries.
> >
> > That happens e.g. during write() or indeed a reflink creation via
> > FICLONE/FICLONERANGE. For the latter privilege stripping happens when
> > only some extents are reflinked and not the whole file. So that's:
> >
> > * ioctl_file_clone()
> >    * vfs_clone_file_range()
> >      * do_clone_file_range()
> >        * generic_file_rw_checks()
> >        * remap_verify_area()
> >          * security_file_permission()
> >        * ->remap_file_range() [1]
> >
> > [1]:
> > btrfs:
> > * btrfs_remap_file_range()
> >    * generic_remap_file_range_prep()
> >      * file_modified() // privilege stripping
> >
> > ocfs2:
> > * ocfs2_remap_file_range()
> >    * generic_remap_file_range_prep()
> >      * file_modified() // privilege stripping
> >
> > xfs:
> > * xfs_remap_file_range()
> >    * generic_remap_file_range_prep()
> >      * file_modified() // privilege stripping
> >
> > // This is stacked, i.e. ovl filesystems will rely on the filesystem
> > // used for the upper mount and it's .remap_file_range() implementation.
> > overlayfs:
> > * ovl_remap_file_range()
> >    * vfs_clone_file_range()
> >
> > The other two implementers are:
> >
> > cifs:
> > * cifs_remap_file_range()
> >
> > nfs:
> > * nfs42_remap_file_range()
> >
> > both of which don't call into generic_remap_file_range_prep() and so
> > file_modified() isn't called. But they are netfses and there's a server
> > involved. In general, this isn't really a concern for this patchset.
> > (But something to potentially to look into in the future.)
> >
> > And it wasn't what I was worried about.
> >
> > The crucial information that we needed was whether reflink callpaths
> > other than ocfs2 create files themselves and therefore might rely
> > implicitly on setgid stripping in inode_init_owner().
> >
> > Now that we looked at all callers we can be confident that this isn't
> > the case. _Apart from ocfs2_ but which you handle in the patchset.
> 
> If I understand correctly, this stripping code is ok. So can I send a v6 
> patch?

Yes. 



[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux