Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp535378pxk; Sun, 30 Aug 2020 13:02:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJycyisirHo2qa5bMU1+82dKdZJE9A8kUTqN5uMzZIKDrB+OixAWAxzx7/Po8JQMDWAoNPdP X-Received: by 2002:a17:906:a24f:: with SMTP id bi15mr9287903ejb.379.1598817729102; Sun, 30 Aug 2020 13:02:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598817729; cv=none; d=google.com; s=arc-20160816; b=y6htYHhZFHDAzmoBv5UF/d8GZEzX+WMlwTlcaOUb7xo0ZQbiZ+Cnjnh8mmqAcMHPEa 3gg0V47OMJUntqekhYzeByPP867nZe7o3y6bNjej7YuEGDDGm/Ce0PSKwDTf7gchuchI w67PaEY3PmENX905JrCEN6g5Xbdcq3HwDPPxdcq0bmISFJUC8LSXJHOTnsULX82uYpic ymyzbxOhhD+MmZ4knYBPFkZMrnc3lJFk12lLw6xnvIvVVw635hHubmmCGX83TXHRk4gK UauimwHEX00zGUKAaIoozQxhp9kFg3/+uz0Q0/GrKTIpwdpgRMb/yuW4ml5EhWjpcJgb gzsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=QQ8diMvX7/3uEfe+7rK+Zf90T4+tE1F/NHA0eyKZkk4=; b=xduq+fe1a58G0E6e2C5OmLZf1AYr7bYPk3Mnvlyw95ujRGD4TEoJdaCX5ie/b7iFdD yiCiBC9j1FZmkuu5lnoJI+gFNBfnBcI7zz7hjrtQ0axmMdEdQM+ndiirS55kpZk+ibIx PZ+/wu0tUej+tVhnSHUQPtuo5qfJtm4BjducV7BtIXNwMcWsDKJGTagxWEA+7dm6v/f8 a38bAE+lrCwqwAEmFwmxLWKdthe/U3SYQTYhew5x617KGCEipoLIz9vegXvseHsotVyz LT2tnrXDE24Ji4MhmCIgm0j9kDUBo6cuPJ+E0Jc6T/VFuTphY+7iLYhORj7wCi5OKTRy SeIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s15si4384843eju.232.2020.08.30.13.01.34; Sun, 30 Aug 2020 13:02:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726436AbgH3UAb (ORCPT + 99 others); Sun, 30 Aug 2020 16:00:31 -0400 Received: from brightrain.aerifal.cx ([216.12.86.13]:48260 "EHLO brightrain.aerifal.cx" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726404AbgH3UAa (ORCPT ); Sun, 30 Aug 2020 16:00:30 -0400 Date: Sun, 30 Aug 2020 16:00:29 -0400 From: Rich Felker To: Jann Horn Cc: linux-fsdevel , kernel list , Linux API , Alexander Viro Subject: Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2 Message-ID: <20200830200029.GF3265@brightrain.aerifal.cx> References: <20200829020002.GC3265@brightrain.aerifal.cx> <20200830163657.GD3265@brightrain.aerifal.cx> <20200830184334.GE3265@brightrain.aerifal.cx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Aug 30, 2020 at 09:02:31PM +0200, Jann Horn wrote: > On Sun, Aug 30, 2020 at 8:43 PM Rich Felker wrote: > > On Sun, Aug 30, 2020 at 08:31:36PM +0200, Jann Horn wrote: > > > On Sun, Aug 30, 2020 at 6:36 PM Rich Felker wrote: > > > > So just checking IS_APPEND in the code paths used by > > > > pwritev2 (and erroring out rather than silently writing output at the > > > > wrong place) should suffice to preserve all existing security > > > > invariants. > > > > > > Makes sense. > > > > There are 3 places where kiocb_set_rw_flags is called with flags that > > seem to be controlled by userspace: aio.c, io_uring.c, and > > read_write.c. Presumably each needs to EPERM out on RWF_NOAPPEND if > > the underlying inode is S_APPEND. To avoid repeating the same logic in > > an error-prone way, should kiocb_set_rw_flags's signature be updated > > to take the filp so that it can obtain the inode and check IS_APPEND > > before accepting RWF_NOAPPEND? It's inline so this should avoid > > actually loading anything except in the codepath where > > flags&RWF_NOAPPEND is nonzero. > > You can get the file pointer from ki->ki_filp. See the RWF_NOWAIT > branch of kiocb_set_rw_flags(). Thanks. I should have looked for that. OK, so a fixup like this on top of the existing patch? diff --git a/include/linux/fs.h b/include/linux/fs.h index 473289bff4c6..674131e8d139 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -3457,8 +3457,11 @@ static inline int kiocb_set_rw_flags(struct kiocb *ki, rwf_t flags) ki->ki_flags |= (IOCB_DSYNC | IOCB_SYNC); if (flags & RWF_APPEND) ki->ki_flags |= IOCB_APPEND; - if (flags & RWF_NOAPPEND) + if (flags & RWF_NOAPPEND) { + if (IS_APPEND(file_inode(ki->ki_filp))) + return -EPERM; ki->ki_flags &= ~IOCB_APPEND; + } return 0; } If this is good I'll submit a v2 as the above squashed with the original patch. Rich