On Thu, 20 Jun 2013 11:27:04 -0400 Brian Foster <bfoster@xxxxxxxxxx> wrote: > On 06/20/2013 09:54 AM, Dwight Engen wrote: > > On Thu, 20 Jun 2013 10:13:41 +1000 > > Dave Chinner <david@xxxxxxxxxxxxx> wrote: > > > >> On Wed, Jun 19, 2013 at 11:09:48AM -0400, Dwight Engen wrote: > >>> Use uint32 from init_user_ns for xfs internal uid/gid > >>> representation in acl, xfs_icdinode. Conversion of kuid/gid is > >>> done at the vfs boundary, other user visible xfs specific > >>> interfaces (bulkstat, eofblocks filter) expect uint32 > >>> init_user_ns uid/gid values. > >> > >> It's minimal, but I'm not sure it's complete. I'll comment on that > >> in response to Eric's comments... > >> > >>> Signed-off-by: Dwight Engen <dwight.engen@xxxxxxxxxx> > >> .... > >>> --- a/fs/xfs/xfs_fs.h > >>> +++ b/fs/xfs/xfs_fs.h > >>> @@ -347,8 +347,8 @@ typedef struct xfs_error_injection { > >>> struct xfs_eofblocks { > >>> __u32 eof_version; > >>> __u32 eof_flags; > >>> - uid_t eof_uid; > >>> - gid_t eof_gid; > >>> + __u32 eof_uid; > >>> + __u32 eof_gid; > >>> prid_t eof_prid; > >>> __u32 pad32; > >>> __u64 eof_min_file_size; > >> > >> The patch doesn't do namespace conversion of these uid/gids, but > >> I'm not sure it should... > > > > The ids are only advisory, if the caller doesn't specify > > XFS_EOF_FLAGS_?ID blocks from any inode in the fs can be reclaimed > > regardless of id. Because of this, I think at a minimum we should > > change XFS_IOC_FREE_EOFBLOCKS to require capable(CAP_SYS_ADMIN), > > which somewhat implies init_user_ns based ids. > > > > To make this really userns aware, I think we could: > > - leave the fields as uid_t > > - make XFS_IOC_FREE_EOFBLOCKS require nsown_capable(CAP_SYS_ADMIN) > > - check kuid_has_mapping(current_user_ns()) for each > > inode. This would be a change in behavior when called > > from !init_user_ns, limiting the scope of inodes the ioctl could > > affect. > > - change xfs_inode_match_id() to use uid_eq(VFS_I(ip)->i_uid, > > make_kuid(current_user_ns(), eofb->eof_uid)) > > > > Does that sound reasonable? > > > > Hi Dwight, > > If I understand correctly, the proposition is to turn > XFS_EOF_FREE_EOFBLOCKS into administrator only functionality and run > ns conversions on the inode uid/gid and associated eofb values for > the ID filtering functionality. Hi Brian, yeah that was the proposal :) I think there are really two issues here. One is that the uid_t/gid_t may come from a userns so we should be aware of that. Currently the ids passed in are used for *filtering* so a malicious user can't do anything more than they already can by not passing ids at all, but we should fix this so only the intended files are affected. Second is that currently the ioctl allows an unprivileged user to affect another user (as Eric pointed out): > I am little dubious about XFS_IOC_FREE_EOFBLOCKS allowing any > user to affect any other user. Your changes just seem to make > it guaranteed that when called from a user namespace the wrong > user will be affected. I don't think the nsown_capability() I proposed is enough to take care of this. Do you agree that if the caller is going to affect other users, they should be CAP_SYS_ADMIN (or maybe CAP_FOWNER) in init_user_ns? > The latter sounds reasonable to me, though I'm not so sure about the > CAP_SYS_ADMIN bit. For example, I think we'd expect a regular user to > be able to run an eofblocks scan against files covered under his > quota. > > Perhaps the right thing to do here is to restrict global (and project > quota?) scans to CAP_SYS_ADMIN and uid/gid based scans to processes > with the appropriate permissions (i.e., CAP_SYS_ADMIN, matching > uid/gid or CAP_FOWNER). Thoughts? That sounds good to me. Maybe for a regular user the appropriate permission check (at the top of xfs_inode_free_eofblocks()) could be something like: if (!capable(CAP_SYS_ADMIN) && !uid_eq(VFS_I(ip)->i_uid, current_fsuid()) && !in_group_p(VFS_I(ip)->i_gid)) return 0; This has the drawback that the caller won't know if they supplied a uid/gid in eofblocks that won't actually get cleared, so maybe we want to validate a uid/gid in eofblocks after its copy_from_user()ed in instead? Also, I'm not sure if this is the same as "under his quota" and how it plays with project quotas. > Brian _______________________________________________ xfs mailing list xfs@xxxxxxxxxxx http://oss.sgi.com/mailman/listinfo/xfs