Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp610410img; Fri, 22 Mar 2019 05:07:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqyWkndofuH1DHdaDKHcaNkG0QFsOfI4X9mJroFNPp3QtAi3bGFygoQWiTr1QZn0ojAZ6vpr X-Received: by 2002:a62:ea0f:: with SMTP id t15mr8974830pfh.124.1553256439697; Fri, 22 Mar 2019 05:07:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553256439; cv=none; d=google.com; s=arc-20160816; b=tregoKNuG/exOArvNYEI8WgbNdRCHsqcQU0hjBTwf3o3C2jYJDNTocLCWM80nszl1l J93+FFS5AfAr5j0WOVujm1ZFSuOfMVEOip/6uXNjuux5DZ/ffSNAZHep4tg0QYr6YbTw PddZt4E+GOzlWe30B9ItwQ20ysqHJWPDuoTzwz+QcSP7ifHul85MlGB5Hjg1Gxm2idRq O6QnZ+mj8Vv838E/WXyqbouKgev8xn4KJ9zYtjVCMwyB/skgRFsWdZIVmKJCpCGnMmGb xqs5sXMz1sdM9kKaQumG9pT8rdK5tFhtI152iY06vUdSCmZdgSCQlOttHlEWoW6fNjDL biJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2yNMCDPjXJzxRdV9G4G5YMmT+SWlXi+jQRerC8IJlI0=; b=ziL11XHBln9owPulfymZXIbymD7zntdPKfJWQohVUujGwkOBif9Ukd4OdVzJ/qAWP4 7pr2qdKchzBxbPNYP1wHq79yZ2AspUmE/nvOkWYcwpNvnSvRkGFIANEU++DunAB0awbv HIkud4HQO2MetXWXQrNS17mKdqML+RFqBeQbNLmSMR8ZIVW7PEB6SGRtPgpJ8FlvFIh3 6RwHkZiXKVrFdHOfYoDr/35gsSD3IDFjRsRlRy8/vuL5bDSNaDBv23svqysyKdQgXs/d kfLUuwMNYtrtPLJANTJbVBEVqbyvwUCh9yKOvhqVUKV9/G6Qj65bCJ22zsoXco6OI4Pc 2TLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bbkq2KGi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e16si6121709pgv.436.2019.03.22.05.07.02; Fri, 22 Mar 2019 05:07:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bbkq2KGi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388860AbfCVMFx (ORCPT + 99 others); Fri, 22 Mar 2019 08:05:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:44304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388210AbfCVMFs (ORCPT ); Fri, 22 Mar 2019 08:05:48 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C56CF21929; Fri, 22 Mar 2019 12:05:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256347; bh=X4jlv/otCQUp725+JLK80HZ8ACjGGQdcVVSH2U2NFWw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bbkq2KGij1XLajQOyiglCyYAQnBdP9dXYWDocDbCO0obFqeoheKAb3XNMxI67N89h h2e8bRakaECNA4IVYTySDedOD55z5Is/CKAejlQsrPNh7q46VprUDxg8+L+iaPfVyM eoZqZvMmNHphszKacY4t7d9Q1H5Y8wAZLNvTbgMg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Giuseppe Scrivano , Vivek Goyal , Miklos Szeredi Subject: [PATCH 4.19 165/280] ovl: During copy up, first copy up data and then xattrs Date: Fri, 22 Mar 2019 12:15:18 +0100 Message-Id: <20190322111323.329929331@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Vivek Goyal commit 5f32879ea35523b9842bdbdc0065e13635caada2 upstream. If a file with capability set (and hence security.capability xattr) is written kernel clears security.capability xattr. For overlay, during file copy up if xattrs are copied up first and then data is, copied up. This means data copy up will result in clearing of security.capability xattr file on lower has. And this can result into surprises. If a lower file has CAP_SETUID, then it should not be cleared over copy up (if nothing was actually written to file). This also creates problems with chown logic where it first copies up file and then tries to clear setuid bit. But by that time security.capability xattr is already gone (due to data copy up), and caller gets -ENODATA. This has been reported by Giuseppe here. https://github.com/containers/libpod/issues/2015#issuecomment-447824842 Fix this by copying up data first and then metadta. This is a regression which has been introduced by my commit as part of metadata only copy up patches. TODO: There will be some corner cases where a file is copied up metadata only and later data copy up happens and that will clear security.capability xattr. Something needs to be done about that too. Fixes: bd64e57586d3 ("ovl: During copy up, first copy up metadata and then data") Cc: # v4.19+ Reported-by: Giuseppe Scrivano Signed-off-by: Vivek Goyal Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/overlayfs/copy_up.c | 31 ++++++++++++++++++------------- 1 file changed, 18 insertions(+), 13 deletions(-) --- a/fs/overlayfs/copy_up.c +++ b/fs/overlayfs/copy_up.c @@ -501,6 +501,24 @@ static int ovl_copy_up_inode(struct ovl_ { int err; + /* + * Copy up data first and then xattrs. Writing data after + * xattrs will remove security.capability xattr automatically. + */ + if (S_ISREG(c->stat.mode) && !c->metacopy) { + struct path upperpath, datapath; + + ovl_path_upper(c->dentry, &upperpath); + if (WARN_ON(upperpath.dentry != NULL)) + return -EIO; + upperpath.dentry = temp; + + ovl_path_lowerdata(c->dentry, &datapath); + err = ovl_copy_up_data(&datapath, &upperpath, c->stat.size); + if (err) + return err; + } + err = ovl_copy_xattr(c->lowerpath.dentry, temp); if (err) return err; @@ -517,19 +535,6 @@ static int ovl_copy_up_inode(struct ovl_ if (err) return err; } - - if (S_ISREG(c->stat.mode) && !c->metacopy) { - struct path upperpath, datapath; - - ovl_path_upper(c->dentry, &upperpath); - BUG_ON(upperpath.dentry != NULL); - upperpath.dentry = temp; - - ovl_path_lowerdata(c->dentry, &datapath); - err = ovl_copy_up_data(&datapath, &upperpath, c->stat.size); - if (err) - return err; - } if (c->metacopy) { err = ovl_check_setxattr(c->dentry, temp, OVL_XATTR_METACOPY,