Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp2059361ybv; Fri, 14 Feb 2020 10:39:19 -0800 (PST) X-Google-Smtp-Source: APXvYqxG6O+zM3CWUp+4FZ6+lWzG+ubA5Ot8VgzfX7nzaQEcW+rPREazEjyB05gWYCZuz5lWtiJu X-Received: by 2002:a9d:74c4:: with SMTP id a4mr3467308otl.119.1581705559452; Fri, 14 Feb 2020 10:39:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581705559; cv=none; d=google.com; s=arc-20160816; b=gHYKrz4bFZV2fLN24OWqg8hCKq8jh9ask1j4gkBZp/qWMY0Gv9nxKC4ajJxqma2lEs mwGFBFdCwXvxXTedazPdpmiM6Qvz9EjdFfoLy1EAZcTuhfcxLqJMNHrD1nanM0SF3zBA VPP1+DvRHW2lzfBs4Tj+6kr1/hLEI9Gz/l76XvboCZl6YI6s3Xp9c1s0Q/kbMSxaOCAp 2mAeHR/Sx4CRengRjMMUXiF5Ovr9MNQS5W4M02SzHG8DHnyyvOVFca7wPtUHnfDm87Mo VTqShGx/mqdH6OT00Zvk9V5aEponCP4zUt2bSx/+nji6i+3W1qenRlC6/JaStCrxkjHo HZ9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Rr6/j921jMKhkslVA9uGMH7DXNXnsJGAveeUit3/318=; b=CHvYOxTp9EJ91QzZdiaZpp3rtJPdWLd7rS6GfPwX2+hkghrOXQWiJWUxjBzP0fM37j fOGz9p6mMzFnP5PbzskaGVFAfFJHI32cM3sreErGZNF/jCs6Au0HaLFD7R50vlEoir/R TZuLcURrca1K6wTUm91DjBowucz/yPzu5XoiNoB6vFnAm2UpZ17Zn1jKLtOnuIRGRtpS WVom4I+p4EqSDijSoy3c2M8ZyW5qRZW9nAtf9FsXlQKy/wXbHAYdmiuJ/DnBVtwK6p3A DqJxPPkSDPP0aZRZs3341wz8xtLnbqesDHcFyTyKzFi5nMV++Eha9qI8ps34CuWYLaWi zJRA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e25si3512631otk.62.2020.02.14.10.39.07; Fri, 14 Feb 2020 10:39:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730665AbgBNSiC (ORCPT + 99 others); Fri, 14 Feb 2020 13:38:02 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:33667 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730561AbgBNSiC (ORCPT ); Fri, 14 Feb 2020 13:38:02 -0500 Received: from ip5f5bf7ec.dynamic.kabel-deutschland.de ([95.91.247.236] helo=wittgenstein.fritz.box) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1j2fqP-0000uO-HU; Fri, 14 Feb 2020 18:37:41 +0000 From: Christian Brauner To: =?UTF-8?q?St=C3=A9phane=20Graber?= , "Eric W. Biederman" , Aleksa Sarai , Jann Horn Cc: smbarber@chromium.org, Seth Forshee , Alexander Viro , Alexey Dobriyan , Serge Hallyn , James Morris , Kees Cook , Jonathan Corbet , Phil Estes , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, containers@lists.linux-foundation.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, Christian Brauner Subject: [PATCH v2 08/28] sys: __sys_setfsgid(): handle fsid mappings Date: Fri, 14 Feb 2020 19:35:34 +0100 Message-Id: <20200214183554.1133805-9-christian.brauner@ubuntu.com> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200214183554.1133805-1-christian.brauner@ubuntu.com> References: <20200214183554.1133805-1-christian.brauner@ubuntu.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Switch setfsgid() to lookup fsids in the fsid mappings. If no fsid mappings are setup the behavior is unchanged, i.e. fsids are looked up in the id mappings. A caller can only setfs{g,u}id() to a given id if the id maps to a valid kid in both the id and fsid maps of the caller's user namespace. This is always the case when no id mappings and fsid mappings have been written. It is also always the case when an id mapping has been written which includes the target id and but no fsid mappings have been written. All non-fsid mapping aware workloads will thus work just as before. Requiring a valid mapping for the target id in both the id and fsid mappings of the container simplifies permission checking for userns visible filesystems such as proc. Signed-off-by: Christian Brauner --- /* v2 */ - Christian Brauner : - Set unmapped fsid as well. --- kernel/sys.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/kernel/sys.c b/kernel/sys.c index 13f790dbda71..864fa78f25a7 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -849,15 +849,19 @@ long __sys_setfsgid(gid_t gid) const struct cred *old; struct cred *new; gid_t old_fsgid; - kgid_t kgid; + kgid_t kgid, kfsgid; old = current_cred(); - old_fsgid = from_kgid_munged(old->user_ns, old->fsgid); + old_fsgid = from_kfsgid_munged(old->user_ns, old->fsgid); - kgid = make_kgid(old->user_ns, gid); + kgid = make_kfsgid(old->user_ns, gid); if (!gid_valid(kgid)) return old_fsgid; + kfsgid = make_kgid(old->user_ns, gid); + if (!gid_valid(kfsgid)) + return old_fsgid; + new = prepare_creds(); if (!new) return old_fsgid; @@ -867,6 +871,7 @@ long __sys_setfsgid(gid_t gid) ns_capable(old->user_ns, CAP_SETGID)) { if (!gid_eq(kgid, old->fsgid)) { new->fsgid = kgid; + new->kfsgid = kfsgid; goto change_okay; } } -- 2.25.0