Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp4634389rwb; Wed, 17 Aug 2022 03:38:04 -0700 (PDT) X-Google-Smtp-Source: AA6agR7P291ilhb4V7GtoerKRBIuw1DwYluYelG6igrXyKh+yNBRyqKQqfe2sz9H9LG1q92Og29Q X-Received: by 2002:a17:907:2722:b0:731:2aeb:7942 with SMTP id d2-20020a170907272200b007312aeb7942mr16044616ejl.734.1660732684219; Wed, 17 Aug 2022 03:38:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660732684; cv=none; d=google.com; s=arc-20160816; b=tlZ+4eEIgM5QjxIUZubyiSqIMHAn/qRaZdNTk6OuUHtTpyicE8HmtuVJG3IjP+ylXc ihDDq2IJk9+iUTGtW6Zq0MNJltOx0NrNWP2b4iqI84QjyWBzGMiio6qbP9Ju6bv6f8yf 8EBAr5eHrYRERfpm74gW+4lIW3aGMMAPl1wcDGbmRZewxQsuFLszvNW2ve1DqmpiL6AP Ae2Dy4owRxpMgpMV/m7OhSSsnmunGG5pJ2HjWqhe8t5Cidj+eOlV5Zf7t/yduBW/FX8k +NOD1rtPtOWgt1TGKXEM2ufvFs9+JK5bPQVompK7hzdn6iflZPGudKTNRFLLcwELnWyZ AYxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=9jruxPToj7xc/oS5rHlxpPOpssy7XT3dNWOlNRoR2/0=; b=EhpsqcFMBFB+krc6WFdYyQaNPS5P71WlVu8culoDhPLO/3V1KzG05I8c4BVVi6vFQU Q9eYT9D1dQHWrWxUHpa/JjpAYOev7kSyEfLmRPQePb0tWdevmMIRlKdfgpNn7Awgi65/ EKQ7Ua2aamauNcFqr0ZGUQyynKVz2Nli0zSzwxSl9FkvZiHa1WWSduclf8OweqN4QHyY JJxHoqV8cAWHSL9MZjOVeo/mieSX8EQrcPPeoca65w8pXvspBKxXXnWO1btLzZ/4rE+w B6mBjCox/HKM6gtlshLmMApdQHfvN+ZjFQSrd9BhrKpE8LGZIRaSNhw5NQeIJ5MYKtkF Cw8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bzIXYFpJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hd41-20020a17090796a900b00711fa454fb3si13854964ejc.889.2022.08.17.03.37.37; Wed, 17 Aug 2022 03:38:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bzIXYFpJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236875AbiHQJzn (ORCPT + 99 others); Wed, 17 Aug 2022 05:55:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238928AbiHQJzf (ORCPT ); Wed, 17 Aug 2022 05:55:35 -0400 Received: from mail-vk1-xa36.google.com (mail-vk1-xa36.google.com [IPv6:2607:f8b0:4864:20::a36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6FDF658522; Wed, 17 Aug 2022 02:55:34 -0700 (PDT) Received: by mail-vk1-xa36.google.com with SMTP id q191so6438287vkb.6; Wed, 17 Aug 2022 02:55:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc; bh=9jruxPToj7xc/oS5rHlxpPOpssy7XT3dNWOlNRoR2/0=; b=bzIXYFpJyFsVjIXTFqBMfmRAWz3RL336qW+IjfQ2uQ7jz8cazOJDKAnvzILS2LwTE9 GSAq87Vrq+676hVxVm/1FBxHgyCj1Ac9lrAS5N8aWHq0zCh5qI4QCCpzxHLz9QSaQ0S+ jxLePMYK9dxOgbaV1FnblBooL2BFJ4vt3VDas5XAj/GeN/y/8ViOpgK5XM5RUHYIOLvK vp2eaVWIQj2aBuMIQnj4muphljQzkHOvLTTm42jL7ww15YFR0MV7LIKcxyefM1I9nyGm 5AzKQTxcLWg3V9/yPvx9HkWr0C4s+O5jiN1Che8szMHCaC+Xuz0a/pii0cZ/ytKW9lao Tk6w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc; bh=9jruxPToj7xc/oS5rHlxpPOpssy7XT3dNWOlNRoR2/0=; b=kGgvHwt+3szhlnHz53+dUZTeTQQZ9QKBSvNYnUVmz13eJ/fV1iwd0dZxei33cyt0sy ECPcFGyjz43Fh1PijcdelOgfVuIXCNSM9hokzhN+0xWW6NjutZZ1dr0t+JcnBCoGpisn BxGoKBN5BkwsAiQVzZeT1D79CQBK5A6QFXpumRKMnO4AD14adwNagG1/xMR09bC5OQLO j2HY4tin04db2TMlYlX6wkk//6b+JSnGLLLRV4pnGZX0pzaOA9Gfga4iEAaZ87o3i7cu YFvDYP04SaaJEv92u5XT7YoawrgblQg7ciEROPYyn8/nINRUAkj1byhyK6OzMALVdAnL px6A== X-Gm-Message-State: ACgBeo0miot98LHerjsDK6ylET5C4j/TiShBQzKX413vs0HeL6y2CTKI WtxcMqppFjfBieezu0JyiRGwC0TIv/6vrJN0XC7Y78eg X-Received: by 2002:a1f:e3c5:0:b0:380:68eb:e647 with SMTP id a188-20020a1fe3c5000000b0038068ebe647mr2730301vkh.11.1660730133526; Wed, 17 Aug 2022 02:55:33 -0700 (PDT) MIME-Version: 1.0 References: <20220817034559.44936-1-zhangtianci.1997@bytedance.com> In-Reply-To: From: Amir Goldstein Date: Wed, 17 Aug 2022 12:55:22 +0300 Message-ID: Subject: Re: [External] Re: [PATCH] ovl: Do not override fsuid and fsgid in ovl_link() To: =?UTF-8?B?5aSp6LWQ5byg?= Cc: Miklos Szeredi , overlayfs , linux-kernel , Jiachen Zhang , Christian Brauner Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 17, 2022 at 12:53 PM Amir Goldstein wrote: > > On Wed, Aug 17, 2022 at 12:11 PM =E5=A4=A9=E8=B5=90=E5=BC=A0 wrote: > > > > On Wed, Aug 17, 2022 at 3:36 PM Amir Goldstein wro= te: > > > > > > On Wed, Aug 17, 2022 at 6:49 AM Zhang Tianci > > > wrote: > > > > > > > > ovl_link() did not create a new inode after commit > > > > 51f7e52dc943 ("ovl: share inode for hard link"), so > > > > in ovl_create_or_link() we should not override cred's > > > > fsuid and fsgid when called by ovl_link(). > > > > > > > > Signed-off-by: Zhang Tianci > > > > Signed-off-by: Jiachen Zhang > > > > --- > > > > fs/overlayfs/dir.c | 4 ++-- > > > > 1 file changed, 2 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c > > > > index 6b03457f72bb..568d338032db 100644 > > > > --- a/fs/overlayfs/dir.c > > > > +++ b/fs/overlayfs/dir.c > > > > @@ -595,9 +595,9 @@ static int ovl_create_or_link(struct dentry *de= ntry, struct inode *inode, > > > > err =3D -ENOMEM; > > > > override_cred =3D prepare_creds(); > > > > if (override_cred) { > > > > - override_cred->fsuid =3D inode->i_uid; > > > > - override_cred->fsgid =3D inode->i_gid; > > > > if (!attr->hardlink) { > > > > + override_cred->fsuid =3D inode->i_uid; > > > > + override_cred->fsgid =3D inode->i_gid; > > > > err =3D security_dentry_create_files_as(den= try, > > > > attr->mode, &dentry->d_name= , old_cred, > > > > override_cred); > > > > -- > > > > > > This change looks incorrect. > > > Unless I am missing something, fsuid/fsgid still need to > > > be overridden for calling link() on underlying fs. > > > What made you do this change? > > > > > > Thanks, > > > Amir. > > > > Hi Amir, > > > > I ran into an error when I tested overlay on fuse: > > $ mkdir /lower /fuse /merge > > $ mount -t fuse /fuse > > $ mkdir /fuse/upper /fuse/work > > $ mount -t overlay /merge -o lowerdir=3D/lower,upperdir=3D/fuse/upper= ,workdir=3Dwork > > $ touch /merge/file > > $ chown bin.bin /merge/file // the file's caller becomes "bin" > > $ ln /merge/file /merge/lnkfile > > > > Then I got an error(EACCES) because fuse daemon checks the link()'s > > caller is "bin", it denied this request. > > I browsed the changing history of ovl_link(). There are two key commits= : > > The first is commit bb0d2b8ad296 ("ovl: fix sgid on directory") which > > overrides the cred's fsuid/fsgid using the new inode. The new inode's > > owner is initialized by inode_init_owner(), and inode->fsuid is > > assigned to the current user. So the override fsuid becomes the > > current user. We know link() is actually modifying the directory, so > > the caller must have the MAY_WRITE permission on the directory. The > > current caller may should have this permission. I think this is > > acceptable to use the caller's fsuid(But I still feel a little > > conflicted with the overlay's design). > > The second is commit 51f7e52dc943 ("ovl: share inode for hard link") > > which removed the inode creation in ovl_link(). This commit move > > inode_init_owner() into ovl_create_object(), so the ovl_link() just > > give the old inode to ovl_create_or_link(). Then the override fsuid > > becomes the old inode's fsuid, neither the caller nor the overlay's > > creator! So I think this is incorrect. > > I think the link() should be like unlink(), overlay fs should just use > > the creator cred to do underlying fs's operations. > > > > I see. The reproducer and explanation belong in the commit message. > > Your argument makes sense to me, but CC Christian to make > sure I am not missing anything related to ACLs and what not. Once again with correct email address... > > Thanks, > Amir.