Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp4913454pxu; Wed, 21 Oct 2020 08:21:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx6g6qf7yr7L0cCS7frjbdBGwbQgaV4x8l1w6ze3ZrE8NYk+nrqwfuWzeoL4qlLhZxuTkKV X-Received: by 2002:a17:906:95d1:: with SMTP id n17mr4176009ejy.75.1603293701499; Wed, 21 Oct 2020 08:21:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603293701; cv=none; d=google.com; s=arc-20160816; b=t5sjZygIqStsuX5e5kEVD3bK9OpR+bxZtAViS+h8dfmD5HPvH44Ii1tA0YBnKGtUCW JhciS5z/QnDULUrCK9kOQcIeV8dN5AUoCYV9Rxv2lvy+3c+HTFC/0bCIe3JL2B3VDoav TOIpxQfELQMFxd2nDwEkonm4MBu4OJToLFItdiwZXeGTIuRE2EAH6uJ45L2YVePPwEVJ XBcDriH/Ltq1Hf8/5Mb91tvls0PrFs7iUcSBSGo4wBRCGHxYIsv9IyUZn0FNRjpomtOk Cbjz2svVqhWI6rlS05uH/ESnrumPgovSJ04tJa0SqhVHZzZFkxPm/pCVqEoQDBxPLQwo cd6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=efq4G8MqGdBF/eY8lwSaqYhaY/yYy7fduOLlye2ztqI=; b=BN6mDcUd2WZ5/N+y+oCA14ZrC5+Pnpp8qpWQ1XfruzJVReBqeXOHdOjwXYPDkmLSW+ 3mCWRq2uvaYCvvA5u8MDIyQRUxY7QVKf3MmxckFvBB7TIoizuhaUIRtuig8WOV5YlRX8 8HqoWaonkwaViug+B8+85ExQEtEfor17bbX0OF+GOLOTa7SkgXBEuI/mOs9czpBIJTVx 6B05mtyEl6up4uWYHJ1Bq/NxcgS6DTnrskluf1fBwbP2VuT6S0BQWlWf5+Wtkt2Ps3f0 htqLvsIQTiIDazO3yNZNrK13lHBDwcuUqp8E+XzlDTVRXT0KrY137L8t1PssHUzkmzuO Nyxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=JCuL8M1S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dc4si1549048ejb.526.2020.10.21.08.21.16; Wed, 21 Oct 2020 08:21:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=JCuL8M1S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2502246AbgJUPTw (ORCPT + 99 others); Wed, 21 Oct 2020 11:19:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2502252AbgJUPTv (ORCPT ); Wed, 21 Oct 2020 11:19:51 -0400 Received: from mail-pl1-x644.google.com (mail-pl1-x644.google.com [IPv6:2607:f8b0:4864:20::644]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CEAC5C0613D6 for ; Wed, 21 Oct 2020 08:19:51 -0700 (PDT) Received: by mail-pl1-x644.google.com with SMTP id d23so1371412pll.7 for ; Wed, 21 Oct 2020 08:19:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=android.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=efq4G8MqGdBF/eY8lwSaqYhaY/yYy7fduOLlye2ztqI=; b=JCuL8M1SY76JdKQFfPglFobKXgulr4MFQSJHl5cSYe8zg0KaOO1AUyohw9tdF5ssfB aCyhngkrMy6/zyBPuKNnexEWoLO4RtZyH0R5kscE91PXDQ24GT6p3BcMiTiOl86qwFn2 hnAiir27rsOi3nGvkoBOPgMosU27ekrBlEmena8B8aLpVmhJStBmMAXpcW0PmjAYOB+S dpkmpMAkLkTTyljOcyeWcxlrgzSYWz3VACJt3RdYnHeMG7Hsao2wB/0fGQGWWnWaOrqb NJJGtOvDbj5oinn6dImDnlDAuRoVPqHhaCNjY9G7NbuJj9X5kvH/9Ffv5UgE4G948Evc vBZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=efq4G8MqGdBF/eY8lwSaqYhaY/yYy7fduOLlye2ztqI=; b=BdraCFFSG2Ki5XtQ+z+dOE13k3Q9vkjkMXYNqRc+z2q5TZtB0Ib0oJWBW9O2cDCTV2 +xuYE1jRcPUziBAp4FCwOVNm6s0W1KKPij3nlkGQPT+KLHe0t+ipzZzgqa0ycqbL+ygG RhUnCuMLIlHvJwL+gtHmsMpaUwtb5h1yCbSKamnPKwRhdIrBi2Pb1mckSSqPtPp3uuPn sZ6mgI8PTQs18+gAHBLxRY7yNX+Wh0YaFGaWbfD4hd2IuBrX9kZchEM0aWtD172wffwp xXpd/DxprLBaRZZSfBsSDOGvoLp6guQaOATxcrPrF//MKs+u4GvpqujoC2BmJ6WyVRBk 4LUw== X-Gm-Message-State: AOAM531LouRlkKqPlXEuiJU5ezt92Kzx3dblNWtHaT6Mwk3GWbOZkdRS zxPvzneD8GRTLDBQQ4PZ7TtaWBT3CXeljw== X-Received: by 2002:a17:902:8bca:b029:d2:42fe:21da with SMTP id r10-20020a1709028bcab02900d242fe21damr4146559plo.31.1603293591068; Wed, 21 Oct 2020 08:19:51 -0700 (PDT) Received: from nebulus.mtv.corp.google.com ([2620:15c:211:200:4a0f:cfff:fe35:d61b]) by smtp.gmail.com with ESMTPSA id s10sm2409646pji.7.2020.10.21.08.19.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Oct 2020 08:19:50 -0700 (PDT) From: Mark Salyzyn To: linux-kernel@vger.kernel.org Cc: kernel-team@android.com, Mark Salyzyn , Miklos Szeredi , Jonathan Corbet , Vivek Goyal , "Eric W . Biederman" , Amir Goldstein , Randy Dunlap , Stephen Smalley , John Stultz , linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-unionfs@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org Subject: [RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix Date: Wed, 21 Oct 2020 08:18:59 -0700 Message-Id: <20201021151903.652827-1-salyzyn@android.com> X-Mailer: git-send-email 2.29.0.rc1.297.gfa9743e501-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Mark Salyzyn (3): Add flags option to get xattr method paired to __vfs_getxattr overlayfs: handle XATTR_NOSECURITY flag for get xattr method overlayfs: override_creds=off option bypass creator_cred Mark Salyzyn + John Stultz (1): overlayfs: inode_owner_or_capable called during execv The first three patches address fundamental security issues that should be solved regardless of the override_creds=off feature. The fourth adds the feature depends on these other fixes. By default, all access to the upper, lower and work directories is the recorded mounter's MAC and DAC credentials. The incoming accesses are checked against the caller's credentials. If the principles of least privilege are applied for sepolicy, the mounter's credentials might not overlap the credentials of the caller's when accessing the overlayfs filesystem. For example, a file that a lower DAC privileged caller can execute, is MAC denied to the generally higher DAC privileged mounter, to prevent an attack vector. We add the option to turn off override_creds in the mount options; all subsequent operations after mount on the filesystem will be only the caller's credentials. The module boolean parameter and mount option override_creds is also added as a presence check for this "feature", existence of /sys/module/overlay/parameters/overlay_creds Signed-off-by: Mark Salyzyn Cc: Miklos Szeredi Cc: Jonathan Corbet Cc: Vivek Goyal Cc: Eric W. Biederman Cc: Amir Goldstein Cc: Randy Dunlap Cc: Stephen Smalley Cc: John Stultz Cc: linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org Cc: linux-unionfs@vger.kernel.org Cc: linux-security-module@vger.kernel.org Cc: kernel-team@android.com Cc: selinux@vger.kernel.org --- v18 - rebase + fix minor cut and paste error for inode argument in __vfs_getxattr v17 - correct some zero-day build failures. - fix up documentation v16 - rebase and merge of two patches. - add adjustment to deal with execv when overrides is off. v15 - Revert back to v4 with fixes from on the way from v5-v14. The single structure argument passing to address the complaints about too many arguments was rejected by the community. - Drop the udner discussion fix for an additional CAP_DAC_READ_SEARCH check. Can address that independently. - ToDo: upstream test frame for thes security fixes (currently testing is all in Android). v14: - Rejoin, rebase and a few adjustments. v13: - Pull out first patch and try to get it in alone feedback, some Acks, and then because people forgot why we were doing i. v12: - Restore squished out patch 2 and 3 in the series, then change algorithm to add flags argument. Per-thread flag is a large security surface. v11: - Squish out v10 introduced patch 2 and 3 in the series, then and use per-thread flag instead for nesting. - Switch name to ovl_do_vds_getxattr for __vds_getxattr wrapper. - Add sb argument to ovl_revert_creds to match future work. v10: - Return NULL on CAP_DAC_READ_SEARCH - Add __get xattr method to solve sepolicy logging issue - Drop unnecessary sys_admin sepolicy checking for administrative driver internal xattr functions. v6: - Drop CONFIG_OVERLAY_FS_OVERRIDE_CREDS. - Do better with the documentation, drop rationalizations. - pr_warn message adjusted to report consequences. v5: - beefed up the caveats in the Documentation - Is dependent on "overlayfs: check CAP_DAC_READ_SEARCH before issuing exportfs_decode_fh" "overlayfs: check CAP_MKNOD before issuing vfs_whiteout" - Added prwarn when override_creds=off v4: - spelling and grammar errors in text v3: - Change name from caller_credentials / creator_credentials to the boolean override_creds. - Changed from creator to mounter credentials. - Updated and fortified the documentation. - Added CONFIG_OVERLAY_FS_OVERRIDE_CREDS v2: - Forward port changed attr to stat, resulting in a build error. - altered commit message. Documentation/filesystems/locking.rst | 2 +- Documentation/filesystems/overlayfs.rst | 26 +++++++++++++++++- fs/9p/acl.c | 3 ++- fs/9p/xattr.c | 3 ++- fs/afs/xattr.c | 10 +++---- fs/btrfs/xattr.c | 3 ++- fs/ceph/xattr.c | 3 ++- fs/cifs/xattr.c | 2 +- fs/ecryptfs/inode.c | 6 +++-- fs/ecryptfs/mmap.c | 2 +- fs/erofs/xattr.c | 3 ++- fs/ext2/xattr_security.c | 2 +- fs/ext2/xattr_trusted.c | 2 +- fs/ext2/xattr_user.c | 2 +- fs/ext4/xattr_hurd.c | 2 +- fs/ext4/xattr_security.c | 2 +- fs/ext4/xattr_trusted.c | 2 +- fs/ext4/xattr_user.c | 2 +- fs/f2fs/xattr.c | 4 +-- fs/fuse/xattr.c | 4 +-- fs/gfs2/xattr.c | 3 ++- fs/hfs/attr.c | 2 +- fs/hfsplus/xattr.c | 3 ++- fs/hfsplus/xattr_security.c | 3 ++- fs/hfsplus/xattr_trusted.c | 3 ++- fs/hfsplus/xattr_user.c | 3 ++- fs/jffs2/security.c | 3 ++- fs/jffs2/xattr_trusted.c | 3 ++- fs/jffs2/xattr_user.c | 3 ++- fs/jfs/xattr.c | 5 ++-- fs/kernfs/inode.c | 3 ++- fs/nfs/nfs4proc.c | 9 ++++--- fs/ocfs2/xattr.c | 9 ++++--- fs/orangefs/xattr.c | 3 ++- fs/overlayfs/copy_up.c | 2 +- fs/overlayfs/dir.c | 17 +++++++----- fs/overlayfs/file.c | 26 +++++++++--------- fs/overlayfs/inode.c | 23 ++++++++-------- fs/overlayfs/namei.c | 6 ++--- fs/overlayfs/overlayfs.h | 7 +++-- fs/overlayfs/ovl_entry.h | 1 + fs/overlayfs/readdir.c | 8 +++--- fs/overlayfs/super.c | 34 ++++++++++++++++++----- fs/overlayfs/util.c | 13 +++++++-- fs/posix_acl.c | 2 +- fs/reiserfs/xattr_security.c | 3 ++- fs/reiserfs/xattr_trusted.c | 3 ++- fs/reiserfs/xattr_user.c | 3 ++- fs/squashfs/xattr.c | 2 +- fs/ubifs/xattr.c | 3 ++- fs/xattr.c | 36 ++++++++++++------------- fs/xfs/xfs_xattr.c | 3 ++- include/linux/xattr.h | 9 ++++--- include/uapi/linux/xattr.h | 7 +++-- mm/shmem.c | 3 ++- net/socket.c | 3 ++- security/commoncap.c | 6 +++-- security/integrity/evm/evm_main.c | 3 ++- security/selinux/hooks.c | 11 +++++--- security/smack/smack_lsm.c | 5 ++-- 60 files changed, 242 insertions(+), 137 deletions(-) -- 2.29.0.rc1.297.gfa9743e501-goog