Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932851AbcCCRCQ (ORCPT ); Thu, 3 Mar 2016 12:02:16 -0500 Received: from mail-oi0-f49.google.com ([209.85.218.49]:32979 "EHLO mail-oi0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756917AbcCCRCK (ORCPT ); Thu, 3 Mar 2016 12:02:10 -0500 Date: Thu, 3 Mar 2016 11:02:01 -0600 From: Seth Forshee To: "Eric W. Biederman" Cc: Alexander Viro , Serge Hallyn , Richard Weinberger , Austin S Hemmelgarn , Miklos Szeredi , linux-kernel@vger.kernel.org, linux-bcache@vger.kernel.org, dm-devel@redhat.com, linux-raid@vger.kernel.org, linux-mtd@lists.infradead.org, linux-fsdevel@vger.kernel.org, fuse-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov Subject: Re: [PATCH RESEND v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes Message-ID: <20160303170201.GA30224@ubuntu-hedt> References: <1451930639-94331-1-git-send-email-seth.forshee@canonical.com> <1451930639-94331-12-git-send-email-seth.forshee@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1451930639-94331-12-git-send-email-seth.forshee@canonical.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1745 Lines: 36 On Mon, Jan 04, 2016 at 12:03:50PM -0600, Seth Forshee wrote: > The mounter of a filesystem should be privileged towards the > inodes of that filesystem. Extend the checks in > inode_owner_or_capable() and capable_wrt_inode_uidgid() to > permit access by users priviliged in the user namespace of the > inode's superblock. Eric - I've discovered a problem related to this patch. The patches you've already applied to your testing branch make it so that s_user_ns can be an unprivileged user for proc and kernfs-based mounts. In some cases DAC is the only thing protecting files in these mounts (ignoring MAC), and with this patch an unprivileged user could bypass DAC. There's a simple solution - always set s_user_ns to &init_user_ns for those filesystems. I think this is the right thing to do, since the backing store behind these filesystems are really kernel objects. But this would break the assumption behind your patch "userns: Simpilify MNT_NODEV handling" and cause a regression in mounting behavior. I've come up with several possible solutions for this conflict. 1. Drop this patch and keep on setting s_user_ns to unprivilged users. This would be unfortunate because I think this patch does make sense for most filesystems. 2. Restrict this patch so that a user privileged towards s_user_ns is only privileged towards the super blocks inodes if s_user_ns has a mapping for both i_uid and i_gid. This is better than (1) but still not ideal in my mind. 3. Drop your patch and maintain the current MNT_NODEV behavior. 4. Add a new s_iflags flag to indicate a super block is from an unprivileged mount, and use this in your patch instead of s_user_ns. Any preference, or any other ideas? Thanks, Seth