Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp460185ybi; Fri, 26 Jul 2019 12:45:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqysd+JhNjBhbRCBpMH6YdJ0lpBuFYs1xG0YWxYoIjYECKVG/L7MtSjX5Xb7ccmJeZKFCcdb X-Received: by 2002:a63:724b:: with SMTP id c11mr13855429pgn.30.1564170300991; Fri, 26 Jul 2019 12:45:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564170300; cv=none; d=google.com; s=arc-20160816; b=nh3xmJrLp/kfFshKi5LTsMQuS9lKzrri7KC0lG2YuRnjCTW/tDCYjBqzbSevFM8e7K w0ot/ohynheF0D78T+bEfAWxlZ6X5wjFoSzOR30wQOKyKIKeauubaDtuLCDAhuW0X5HN Yhdw3ZVxiNltHuWh8zH8NLgluMnwi6sAr6hOPI/n07W+ttXszfSYedmMvLfhqpwugJwY foXFYyPDwFdDUH8dlMKeuwqdadxZ0T25IN+5fReSHJDtg+NcEMra6JYXtSaa45q58lFq 8e5492qfq2LYNNKk7zuICbeceHP7bajFN6eYhH308FTflzTQTQNC6v8YG9GAMwim3HoS vVQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=cJ4z2P+szfKPD/+W44RYswMnwdJpu0con0N06FUapqc=; b=BkiDiNQ1g2i3Av0u5RXMZHnzI83waYnlwy965hwMddK7s7P69OwRP5PT8V/XDWbSct dSxFpzVGu+EKA28cTG5ZVZQ9utg0qRXajjWtqCKJjdJjDj2tF44vrrJw+3KZnrta6HP4 VMX2Bcge2no43oEYjijlJLdQiN89OfoTauNjgUNRrM2+s7zxLSauz8lhpB869+Q4bPVf lUNBcvglfDEKhCUMCQvyjJUrllvNm+VEip4bugKId01Gx4SXTc8Xx0dXV06y+xgKJaux jTawahC06U2Nl2D/WRrr49cJ1yaohpauSX7X5sI7idrCCSqbU5KFMhkavCJmLPoT6if2 zRzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=PR6TPxJd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d7si20843315pgv.86.2019.07.26.12.44.45; Fri, 26 Jul 2019 12:45:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=PR6TPxJd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727562AbfGZSat (ORCPT + 99 others); Fri, 26 Jul 2019 14:30:49 -0400 Received: from mail-pf1-f196.google.com ([209.85.210.196]:37531 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726814AbfGZSas (ORCPT ); Fri, 26 Jul 2019 14:30:48 -0400 Received: by mail-pf1-f196.google.com with SMTP id 19so24898772pfa.4 for ; Fri, 26 Jul 2019 11:30:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=android.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=cJ4z2P+szfKPD/+W44RYswMnwdJpu0con0N06FUapqc=; b=PR6TPxJd9R1dOURlef11XecrEedDn92M3WMh17SWdO7bsrb6cRshsw7KDpOPp9s9vJ FYRClfphKPyjkcuI2tAZriIs3yxRBFbuyTaP1YWmoASw95qxsRMJGZ6AB/ayE3ICcmdn oMo5fNNgR4KQ2JFI6mbYik++MlADACgesquk5Y0PW57GPoe3m31pzxSJ6liVPjdZ8KOO FmwuMSaxJtDMr1090sNB/opdGBtYBJ1NScaYXHmxC32JjTG+xm1+7zuRuan9DdBb663F mvWmCu9lyR/coEYmjPAIUjI2yGpLiK+7dUGhDk29pV1LKV1/B/Y1opDf9Sj05TYLjP3L nG3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=cJ4z2P+szfKPD/+W44RYswMnwdJpu0con0N06FUapqc=; b=RkimXIgD/P9y8UO0vS8h3iv6BQmVdZtGyYj3F2iiIhXP2gZfgI42TDlAsT0a2Vmv0C VF50RGErp0coGB36gWkIbXhNIf9OJEbVFmEuBDqbdzoXLcKyzjzhgwKNK/xhwvazLJX0 e/L9ihtAj2doS7g/Pl8g4zH2W5p83XmmvF4nG9VbezF61v8LJsRusbkHhPITZmxCA8iv jfTylTjFa+7uaaea8YAlSAudPiYQcMLofcSb3xSAS6/TPyYMWcE64YNC3x/52qu1DB0V kmPlEPFTnBXCJgGGjP6wkjjN8xjRj+ndmDICRwb7sS5BSil7U4aX3u9WWO2uN0JjyHYQ etXw== X-Gm-Message-State: APjAAAXwmr4Y6x8Zr1NBzElnjRnyCa39TUps5Rtq68SZxh84Szuw3drD TBpbskKqK099VS/+9sEpEHc= X-Received: by 2002:a65:6294:: with SMTP id f20mr95138419pgv.349.1564165847849; Fri, 26 Jul 2019 11:30:47 -0700 (PDT) Received: from nebulus.mtv.corp.google.com ([2620:15c:211:200:5404:91ba:59dc:9400]) by smtp.googlemail.com with ESMTPSA id d6sm47190235pgf.55.2019.07.26.11.30.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 26 Jul 2019 11:30:47 -0700 (PDT) Subject: Re: [PATCH v10 3/5] overlayfs: add __get xattr method To: Amir Goldstein Cc: linux-kernel , kernel-team@android.com, Miklos Szeredi , Jonathan Corbet , Vivek Goyal , "Eric W . Biederman" , Randy Dunlap , Stephen Smalley , overlayfs , linux-doc@vger.kernel.org References: <20190724195719.218307-1-salyzyn@android.com> <20190724195719.218307-4-salyzyn@android.com> <35b70147-25ad-4c29-3972-418ebee5e7b8@android.com> From: Mark Salyzyn Message-ID: Date: Fri, 26 Jul 2019 11:30:46 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-GB Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/25/19 10:04 PM, Amir Goldstein wrote: > On Thu, Jul 25, 2019 at 7:22 PM Mark Salyzyn wrote: >> On 7/25/19 8:43 AM, Amir Goldstein wrote: >>> On Thu, Jul 25, 2019 at 6:03 PM Mark Salyzyn wrote: >>>> On 7/24/19 10:48 PM, Amir Goldstein wrote: >>>>> On Wed, Jul 24, 2019 at 10:57 PM Mark Salyzyn wrote: >>>>>> Because of the overlayfs getxattr recursion, the incoming inode fails >>>>>> to update the selinux sid resulting in avc denials being reported >>>>>> against a target context of u:object_r:unlabeled:s0. >>>>> This description is too brief for me to understand the root problem. >>>>> What's wring with the overlayfs getxattr recursion w.r.t the selinux >>>>> security model? >>>> __vfs_getxattr (the way the security layer acquires the target sid >>>> without recursing back to security to check the access permissions) >>>> calls get xattr method, which in overlayfs calls vfs_getxattr on the >>>> lower layer (which then recurses back to security to check permissions) >>>> and reports back -EACCES if there was a denial (which is OK) and _no_ >>>> sid copied to caller's inode security data, bubbles back to the security >>>> layer caller, which reports an invalid avc: message for >>>> u:object_r:unlabeled:s0 (the uninitialized sid instead of the sid for >>>> the lower filesystem target). The blocked access is 100% valid, it is >>>> supposed to be blocked. This does however result in a cosmetic issue >>>> that makes it impossible to use audit2allow to construct a rule that >>>> would be usable to fix the access problem. >>>> >>> Ahhh you are talking about getting the security.selinux.* xattrs? >>> I was under the impression (Vivek please correct me if I wrong) >>> that overlayfs objects cannot have individual security labels and >> They can, and we _need_ them for Android's use cases, upper and lower >> filesystems. >> >> Some (most?) union filesystems (like Android's sdcardfs) set sepolicy >> from the mount options, we did not need this adjustment there of course. >> >>> the only way to label overlayfs objects is by mount options on the >>> entire mount? Or is this just for lower layer objects? >>> >>> Anyway, the API I would go for is adding a @flags argument to >>> get() which can take XATTR_NOSECURITY akin to >>> FMODE_NONOTIFY, GFP_NOFS, meant to avoid recursions. >> I do like it better (with the following 7 stages of grief below), best >> for the future. >> >> The change in this handler's API will affect all filesystem drivers >> (well, my change affects the ABI, so it is not as-if I saved the world >> from a module recompile) touching all filesystem sources with an even >> larger audience of stakeholders. Larger audience of stakeholders, the >> harder to get the change in ;-/. This is also concerning since I would >> like this change to go to stable 4.4, 4.9, 4.14 and 4.19 where this >> regression got introduced. I can either craft specific stable patches or >> just let it go and deal with them in the android-common distributions >> rather than seeking stable merged down. ABI/API breaks are a problem for >> stable anyway ... >> > Use the memalloc_nofs_save/restore design pattern will avoid all that > grief. > As a matter of fact, this issue could and should be handled inside security > subsystem without bothering any other subsystem. > LSM have per task context right? That context could carry the recursion > flags to know that the getxattr call is made by the security subsystem itself. > The problem is not limited to union filesystems. > In general its a stacking issue. ecryptfs is also a stacking fs, out-of-tree > shiftfs as well. But it doesn't end there. > A filesystem on top of a loop device inside another filesystem could > also maybe result in security hook recursion (not sure if in practice). > > Thanks, > Amir. Good point, back to Stephen Smalley? There are four __vfs_getxattr calls inside security, not sure I see any natural way to determine the recursion in security/selinux I can beg/borrow/steal from; but I get the strange feeling that it is better to detect recursion in __vfs_getxattr in this manner, and switch out checking in vfs_getxattr since it is localized to just fs/xattr.c. selinux might not be the only user of __vfs_getxattr nature ... I have implemented and tested the solution where we add a flag to the .get method, it works. I would be tempted to submit that instead in case someone in the future can imagine using that flag argument to solve other problem(s) (if you build it, they will come). Will add a new per-process flag that __vfs_getxattr and vfs_getxattr plays with and see how it works and what it looks like. Sincerely -- Mark Salyzyn