Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp15563pxb; Wed, 27 Jan 2021 00:22:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJyZ7Lm8fDxpXEd6mJDiSd7ZMj+izuEIIFE7r4b0usPJb23hrUJjq77E9dTeLc/KOy6EU5fc X-Received: by 2002:a50:998f:: with SMTP id m15mr8033832edb.342.1611735772764; Wed, 27 Jan 2021 00:22:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611735772; cv=none; d=google.com; s=arc-20160816; b=l5KHEqssLNFSvqeuf+5M2vrpd0yHBvflqqwBMgz8C0SVZj2WkUt0bxyKRYTQhtMs+P FULjJR8HGNcFTF7d5xAwOQrFaVPy94pkArtTZjJqGTjyhr+FKbaJ7OLLg70SCvAGXLO9 h53Zf7FXtxZoYQSP+qQ23GvK2DIHm5BpQU+8YI4ajxnaza8fr1TL/Gp3D7yKnsmk5qKo qBmf2UCPpJrVFw29XOC1LrLOApbNtx3DDxe+NrLKSc/giTst17aWhUhsW33Kf/JWra65 a+OKLyNxklX3xxi1NLW03GOhXj2JpAH7abCAVJiTXs0V0f191AETajnordXIfHmT6kGu tBZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=e7INbIfK/wJm8NsN4dy+SpRi0cWp3h4CE8061Ss8QBw=; b=s5fYrUPWLxbWKQYFwn61802gdH9OA89RMPj8jteOC/Gs0Dh+7C1Px2dd4y8NtOD7a6 IAaTHx5dAS1+Sf4nfCZICJ3C2lWEJqftcns8jPNNr7RUKH9YlRsyw1OZgNeCoBieyPH6 1Ub/p1MWMwgK1acq8OiftqI/TamsoFaTePS7aFble3l7Gn59ugOSrF28fPeUUbyu/Qyt YeY7LGomo5YUqitYEeCuuMyX2zHzOxUpw1YuOjHzuZD4seC6/D90tI9q2Nu0X/oUptr6 FeFwXTqIjWv9AU6qY2We+aUmWk9xniqhsfgBKSzPz7qiFz7QPLbwwN1rCSWBcLcFwT2h PJKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o14si528942ejb.361.2021.01.27.00.22.27; Wed, 27 Jan 2021 00:22:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235814AbhA0GKD (ORCPT + 99 others); Wed, 27 Jan 2021 01:10:03 -0500 Received: from mail.hallyn.com ([178.63.66.53]:60370 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233843AbhA0FwB (ORCPT ); Wed, 27 Jan 2021 00:52:01 -0500 Received: by mail.hallyn.com (Postfix, from userid 1001) id 55466864; Tue, 26 Jan 2021 23:50:12 -0600 (CST) Date: Tue, 26 Jan 2021 23:50:12 -0600 From: "Serge E. Hallyn" To: Christian Brauner Cc: "Eric W. Biederman" , Alexander Viro , Christoph Hellwig , linux-fsdevel@vger.kernel.org, John Johansen , James Morris , Mimi Zohar , Dmitry Kasatkin , Stephen Smalley , Casey Schaufler , Arnd Bergmann , Andreas Dilger , OGAWA Hirofumi , Geoffrey Thomas , Mrunal Patel , Josh Triplett , Andy Lutomirski , Theodore Tso , Alban Crequy , Tycho Andersen , David Howells , James Bottomley , Seth Forshee , =?iso-8859-1?Q?St=E9phane?= Graber , Linus Torvalds , Aleksa Sarai , Lennart Poettering , smbarber@chromium.org, Phil Estes , Serge Hallyn , Kees Cook , Todd Kjos , Paul Moore , Jonathan Corbet , containers@lists.linux-foundation.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, linux-ext4@vger.kernel.org, linux-xfs@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org Subject: Re: [PATCH v6 23/40] exec: handle idmapped mounts Message-ID: <20210127055012.GA32153@mail.hallyn.com> References: <20210121131959.646623-1-christian.brauner@ubuntu.com> <20210121131959.646623-24-christian.brauner@ubuntu.com> <875z3l0y56.fsf@x220.int.ebiederm.org> <20210125164404.aullgl3vlajgkef3@wittgenstein> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210125164404.aullgl3vlajgkef3@wittgenstein> User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Jan 25, 2021 at 05:44:04PM +0100, Christian Brauner wrote: > On Mon, Jan 25, 2021 at 10:39:01AM -0600, Eric W. Biederman wrote: > > Christian Brauner writes: > > > > > When executing a setuid binary the kernel will verify in bprm_fill_uid() > > > that the inode has a mapping in the caller's user namespace before > > > setting the callers uid and gid. Let bprm_fill_uid() handle idmapped > > > mounts. If the inode is accessed through an idmapped mount it is mapped > > > according to the mount's user namespace. Afterwards the checks are > > > identical to non-idmapped mounts. If the initial user namespace is > > > passed nothing changes so non-idmapped mounts will see identical > > > behavior as before. > > > > This does not handle the v3 capabilites xattr with embeds a uid. > > So at least at that level you are missing some critical conversions. > > Thanks for looking. Vfs v3 caps are handled earlier in the series. I'm > not sure what you're referring to here. There are tests in xfstests that > verify vfs3 capability behavior. > > Christian So fwiw I just tested it manually as well. Scenario: uid 1000 user ubuntu uid 1001 user u2 sudo ./mount-idmapped --map-mount b:1000:1001:1 /home/ubuntu/ /mnt su - u2 cp /usr/bin/id /mnt/ unshare -Urm setcap cap_setuid=pe /mnt/id At this point, from init_user_ns, ubuntu@fscaps:~/mount-idmapped$ /home/u2/rcap /mnt/id v3, rootid is 1001 ubuntu@fscaps:~/mount-idmapped$ /home/u2/rcap //home/ubuntu/id v3, rootid is 1000 -serge