linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jeff Layton <jlayton@kernel.org>
To: Christian Brauner <brauner@kernel.org>, ceph-devel@vger.kernel.org
Cc: Ilya Dryomov <idryomov@gmail.com>, Christoph Hellwig <hch@lst.de>,
	linux-fsdevel@vger.kernel.org, stable@vger.kernel.org,
	Christian Brauner <christian.brauner@ubuntu.com>
Subject: Re: [PATCH v2] ceph: fix up non-directory creation in SGID directories
Date: Mon, 29 Nov 2021 07:09:45 -0500	[thread overview]
Message-ID: <cc7fe167e997b001084c84141a9e03db8abe1211.camel@kernel.org> (raw)
In-Reply-To: <20211129111639.3633764-1-brauner@kernel.org>

On Mon, 2021-11-29 at 12:16 +0100, Christian Brauner wrote:
> From: Christian Brauner <christian.brauner@ubuntu.com>
> 
> Ceph always inherits the SGID bit if it is set on the parent inode,
> while the generic inode_init_owner does not do this in a few cases where
> it can create a possible security problem (cf. [1]).
> 
> Update ceph to strip the SGID bit just as inode_init_owner would.
> 
> This bug was detected by the mapped mount testsuite in [3]. The
> testsuite tests all core VFS functionality and semantics with and
> without mapped mounts. That is to say it functions as a generic VFS
> testsuite in addition to a mapped mount testsuite. While working on
> mapped mount support for ceph, SIGD inheritance was the only failing
> test for ceph after the port.
> 
> The same bug was detected by the mapped mount testsuite in XFS in
> January 2021 (cf. [2]).
> 
> [1]: commit 0fa3ecd87848 ("Fix up non-directory creation in SGID directories")
> [2]: commit 01ea173e103e ("xfs: fix up non-directory creation in SGID directories")
> [3]: https://git.kernel.org/fs/xfs/xfstests-dev.git
> Cc: Ilya Dryomov <idryomov@gmail.com>
> Cc: Christoph Hellwig <hch@lst.de>
> Cc: Jeff Layton <jlayton@kernel.org>
> Cc: ceph-devel@vger.kernel.org
> CC: linux-fsdevel@vger.kernel.org
> Cc: stable@vger.kernel.org
> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
> ---
> /* v2 */
> - Christian Brauner <christian.brauner@ubuntu.com>:
>   - Add missing cpu_to_le32() when assigning to in.gid to prevent sparse
>     warnings.
> 
> The test used for this is [3]:
> 
> /* The following tests are concerned with setgid inheritance. These can be
>  * filesystem type specific. For xfs, if a new file or directory is created
>  * within a setgid directory and irix_sgid_inhiert is set then inherit the
>  * setgid bit if the caller is in the group of the directory.
>  */
> static int setgid_create(void)
> {
> 	int fret = -1;
> 	int file1_fd = -EBADF;
> 	pid_t pid;
> 
> 	if (!caps_supported())
> 		return 0;
> 
> 	if (fchmod(t_dir1_fd, S_IRUSR |
> 			      S_IWUSR |
> 			      S_IRGRP |
> 			      S_IWGRP |
> 			      S_IROTH |
> 			      S_IWOTH |
> 			      S_IXUSR |
> 			      S_IXGRP |
> 			      S_IXOTH |
> 			      S_ISGID), 0) {
> 		log_stderr("failure: fchmod");
> 		goto out;
> 	}
> 
> 	/* Verify that the setgid bit got raised. */
> 	if (!is_setgid(t_dir1_fd, "", AT_EMPTY_PATH)) {
> 		log_stderr("failure: is_setgid");
> 		goto out;
> 	}
> 
> 	pid = fork();
> 	if (pid < 0) {
> 		log_stderr("failure: fork");
> 		goto out;
> 	}
> 	if (pid == 0) {
> 		/* create regular file via open() */
> 		file1_fd = openat(t_dir1_fd, FILE1, O_CREAT | O_EXCL | O_CLOEXEC, S_IXGRP | S_ISGID);
> 		if (file1_fd < 0)
> 			die("failure: create");
> 
> 		/* We're capable_wrt_inode_uidgid() and also our fsgid matches
> 		 * the directories gid.
> 		 */
> 		if (!is_setgid(t_dir1_fd, FILE1, 0))
> 			die("failure: is_setgid");
> 
> 		/* create directory */
> 		if (mkdirat(t_dir1_fd, DIR1, 0000))
> 			die("failure: create");
> 
> 		/* Directories always inherit the setgid bit. */
> 		if (!is_setgid(t_dir1_fd, DIR1, 0))
> 			die("failure: is_setgid");
> 
> 		if (unlinkat(t_dir1_fd, FILE1, 0))
> 			die("failure: delete");
> 
> 		if (unlinkat(t_dir1_fd, DIR1, AT_REMOVEDIR))
> 			die("failure: delete");
> 
> 		exit(EXIT_SUCCESS);
> 	}
> 	if (wait_for_pid(pid))
> 		goto out;
> 
> 	pid = fork();
> 	if (pid < 0) {
> 		log_stderr("failure: fork");
> 		goto out;
> 	}
> 	if (pid == 0) {
> 		if (!switch_ids(0, 10000))
> 			die("failure: switch_ids");
> 
> 		if (!caps_down())
> 			die("failure: caps_down");
> 
> 		/* create regular file via open() */
> 		file1_fd = openat(t_dir1_fd, FILE1, O_CREAT | O_EXCL | O_CLOEXEC, S_IXGRP | S_ISGID);
> 		if (file1_fd < 0)
> 			die("failure: create");
> 
> 		/* Neither in_group_p() nor capable_wrt_inode_uidgid() so setgid
> 		 * bit needs to be stripped.
> 		 */
> 		if (is_setgid(t_dir1_fd, FILE1, 0))
> 			die("failure: is_setgid");
> 
> 		/* create directory */
> 		if (mkdirat(t_dir1_fd, DIR1, 0000))
> 			die("failure: create");
> 
> 		if (xfs_irix_sgid_inherit_enabled()) {
> 			/* We're not in_group_p(). */
> 			if (is_setgid(t_dir1_fd, DIR1, 0))
> 				die("failure: is_setgid");
> 		} else {
> 			/* Directories always inherit the setgid bit. */
> 			if (!is_setgid(t_dir1_fd, DIR1, 0))
> 				die("failure: is_setgid");
> 		}
> 
> 		exit(EXIT_SUCCESS);
> 	}
> 	if (wait_for_pid(pid))
> 		goto out;
> 
> 	fret = 0;
> 	log_debug("Ran test");
> out:
> 	safe_close(file1_fd);
> 
> 	return fret;
> }
> ---
>  fs/ceph/file.c | 18 +++++++++++++++---
>  1 file changed, 15 insertions(+), 3 deletions(-)
> 
> diff --git a/fs/ceph/file.c b/fs/ceph/file.c
> index 02a0a0fd9ccd..65d65c51d91d 100644
> --- a/fs/ceph/file.c
> +++ b/fs/ceph/file.c
> @@ -605,13 +605,25 @@ static int ceph_finish_async_create(struct inode *dir, struct dentry *dentry,
>  	in.cap.realm = cpu_to_le64(ci->i_snap_realm->ino);
>  	in.cap.flags = CEPH_CAP_FLAG_AUTH;
>  	in.ctime = in.mtime = in.atime = iinfo.btime;
> -	in.mode = cpu_to_le32((u32)mode);
>  	in.truncate_seq = cpu_to_le32(1);
>  	in.truncate_size = cpu_to_le64(-1ULL);
>  	in.xattr_version = cpu_to_le64(1);
>  	in.uid = cpu_to_le32(from_kuid(&init_user_ns, current_fsuid()));
> -	in.gid = cpu_to_le32(from_kgid(&init_user_ns, dir->i_mode & S_ISGID ?
> -				dir->i_gid : current_fsgid()));
> +	if (dir->i_mode & S_ISGID) {
> +		in.gid = cpu_to_le32(from_kgid(&init_user_ns, dir->i_gid));
> +
> +		/* Directories always inherit the setgid bit. */
> +		if (S_ISDIR(mode))
> +			mode |= S_ISGID;
> +		else if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP) &&
> +			 !in_group_p(dir->i_gid) &&
> +			 !capable_wrt_inode_uidgid(&init_user_ns, dir, CAP_FSETID))
> +			mode &= ~S_ISGID;
> +	} else {
> +		in.gid = cpu_to_le32(from_kgid(&init_user_ns, current_fsgid()));
> +	}
> +	in.mode = cpu_to_le32((u32)mode);
> +
>  	in.nlink = cpu_to_le32(1);
>  	in.max_size = cpu_to_le64(lo->stripe_unit);
>  
> 
> base-commit: d58071a8a76d779eedab38033ae4c821c30295a5

Thanks Christian,

Merged into our "testing" branch. We'll plan to get this up to Linus
fairly soon since it's marked for stable.

Cheers,
-- 
Jeff Layton <jlayton@kernel.org>

      reply	other threads:[~2021-11-29 12:11 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-29 11:16 [PATCH v2] ceph: fix up non-directory creation in SGID directories Christian Brauner
2021-11-29 12:09 ` Jeff Layton [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cc7fe167e997b001084c84141a9e03db8abe1211.camel@kernel.org \
    --to=jlayton@kernel.org \
    --cc=brauner@kernel.org \
    --cc=ceph-devel@vger.kernel.org \
    --cc=christian.brauner@ubuntu.com \
    --cc=hch@lst.de \
    --cc=idryomov@gmail.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).