From: xiujianfeng <xiujianfeng@huawei.com>
To: "Mickaël Salaün" <mic@digikod.net>,
paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com,
shuah@kernel.org, corbet@lwn.net
Cc: <linux-security-module@vger.kernel.org>,
<linux-kernel@vger.kernel.org>, <linux-kselftest@vger.kernel.org>,
<linux-doc@vger.kernel.org>
Subject: Re: [PATCH -next v2 2/6] landlock: abstract walk_to_visible_parent() helper
Date: Wed, 31 Aug 2022 19:56:41 +0800 [thread overview]
Message-ID: <2e8ecf17-dee3-5e91-b03a-214604dec3fa@huawei.com> (raw)
In-Reply-To: <4f5adce6-50a6-ca2e-6146-71626d2af197@digikod.net>
Hi,
在 2022/8/30 19:22, Mickaël Salaün 写道:
>
> On 27/08/2022 13:12, Xiu Jianfeng wrote:
>> This helper will be used in the next commit which supports chmod and
>> chown access rights restriction.
>>
>> Signed-off-by: Xiu Jianfeng <xiujianfeng@huawei.com>
>> ---
>> security/landlock/fs.c | 67 ++++++++++++++++++++++++++++++------------
>> 1 file changed, 49 insertions(+), 18 deletions(-)
>>
>> diff --git a/security/landlock/fs.c b/security/landlock/fs.c
>> index c57f581a9cd5..4ef614a4ea22 100644
>> --- a/security/landlock/fs.c
>> +++ b/security/landlock/fs.c
>> @@ -38,6 +38,44 @@
>> #include "ruleset.h"
>> #include "setup.h"
>> +enum walk_result {
>> + WALK_CONTINUE,
>> + WALK_TO_REAL_ROOT,
>> + WALK_TO_DISCONN_ROOT,
>
> Why did you created these results instead of the ones I proposed?
>
>
>> +};
>> +
>> +/*
>> + * walk to the visible parent, caller should call path_get()/path_put()
>> + * before/after this helpler.
>> + *
>> + * Returns:
>> + * - WALK_TO_REAL_ROOT if walk to the real root;
>> + * - WALK_TO_DISCONN_ROOT if walk to disconnected root;
>> + * - WALK_CONTINUE otherwise.
>> + */
>> +static enum walk_result walk_to_visible_parent(struct path *path)
>> +{
>> + struct dentry *parent_dentry;
>> +jump_up:
>> + if (path->dentry == path->mnt->mnt_root) {
>> + if (follow_up(path)) {
>> + /* Ignores hidden mount points. */
>> + goto jump_up;
>> + } else {
>> + /* Stop at the real root. */
>> + return WALK_TO_REAL_ROOT;
>> + }
>> + }
>> + /* Stops at disconnected root directories. */
>> + if (unlikely(IS_ROOT(path->dentry)))
>> + return WALK_TO_DISCONN_ROOT;
>> + parent_dentry = dget_parent(path->dentry);
>> + dput(path->dentry);
>> + path->dentry = parent_dentry;
>> +
>> + return WALK_CONTINUE;
>> +}
>> +
>> /* Underlying object management */
>> static void release_inode(struct landlock_object *const object)
>> @@ -539,8 +577,8 @@ static int check_access_path_dual(
>> * restriction.
>> */
>> while (true) {
>> - struct dentry *parent_dentry;
>> const struct landlock_rule *rule;
>> + enum walk_result wr;
>
> Please make the names understandable. In this case this variable may not
> be needed anyway.
>
>
>> /*
>> * If at least all accesses allowed on the destination are
>> @@ -588,20 +626,12 @@ static int check_access_path_dual(
>> if (allowed_parent1 && allowed_parent2)
>> break;
>> -jump_up:
>> - if (walker_path.dentry == walker_path.mnt->mnt_root) {
>> - if (follow_up(&walker_path)) {
>> - /* Ignores hidden mount points. */
>> - goto jump_up;
>> - } else {
>> - /*
>> - * Stops at the real root. Denies access
>> - * because not all layers have granted access.
>> - */
>> - break;
>> - }
>> - }
>> - if (unlikely(IS_ROOT(walker_path.dentry))) {
>> + wr = walk_to_visible_parent(&walker_path);
>> + switch (wr) {
>> + case WALK_TO_REAL_ROOT:
>> + /* Stop at the real root. */
>> + goto out;
>> + case WALK_TO_DISCONN_ROOT:
>> /*
>> * Stops at disconnected root directories. Only allows
>> * access to internal filesystems (e.g. nsfs, which is
>> @@ -609,12 +639,13 @@ static int check_access_path_dual(
>> */
>> allowed_parent1 = allowed_parent2 =
>> !!(walker_path.mnt->mnt_flags & MNT_INTERNAL);
>
> Why not include this check in the helper? This is then not checked in
> patch 3 with current_check_access_path_context_only(), which is a bug.
I get your point, after moving it to the helper, here should be:
while (true) {
...
switch(walk_to_visible_parent(&walker_path)) {
case WALK_CONTINUE:
break;
case WALK_ALLOWED:
allowed_parent1 = allowed_parent2 = true;
goto out;
case WR_DENIED:
default:
allowed_parent1 = allowed_parent2 = false;
goto out;
}
}
>
>
>> + goto out;
>> + case WALK_CONTINUE:
>> + default:
>> break;
>> }
>> - parent_dentry = dget_parent(walker_path.dentry);
>> - dput(walker_path.dentry);
>> - walker_path.dentry = parent_dentry;
>> }
>> +out:
>> path_put(&walker_path);
>> if (allowed_parent1 && allowed_parent2)
> .
next prev parent reply other threads:[~2022-08-31 11:56 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-08-27 11:12 [PATCH -next v2 0/6] landlock: add chmod and chown support Xiu Jianfeng
2022-08-27 11:12 ` [PATCH -next v2 1/6] landlock: expand access_mask_t to u32 type Xiu Jianfeng
2022-08-27 11:12 ` [PATCH -next v2 2/6] landlock: abstract walk_to_visible_parent() helper Xiu Jianfeng
2022-08-30 11:22 ` Mickaël Salaün
2022-08-31 11:56 ` xiujianfeng [this message]
2022-08-27 11:12 ` [PATCH -next v2 3/6] landlock: add chmod and chown support Xiu Jianfeng
2022-08-27 19:30 ` Günther Noack
2022-08-29 1:17 ` xiujianfeng
2022-08-29 16:01 ` Mickaël Salaün
2022-09-01 13:06 ` xiujianfeng
2022-09-01 17:34 ` Mickaël Salaün
2022-10-29 8:33 ` xiujianfeng
2022-11-14 14:12 ` Mickaël Salaün
2022-11-18 9:03 ` xiujianfeng
2022-11-18 12:32 ` Mickaël Salaün
2022-11-21 13:48 ` xiujianfeng
2022-08-29 6:30 ` xiujianfeng
2022-08-29 6:35 ` xiujianfeng
2022-08-27 11:12 ` [PATCH -next v2 4/6] landlock/selftests: add selftests for chmod and chown Xiu Jianfeng
2022-08-27 17:48 ` Günther Noack
2022-08-29 1:49 ` xiujianfeng
2022-08-27 11:12 ` [PATCH -next v2 5/6] landlock/samples: add chmod and chown support Xiu Jianfeng
2022-08-27 11:12 ` [PATCH -next v2 6/6] landlock: update chmod and chown support in document Xiu Jianfeng
2022-08-27 17:28 ` Günther Noack
2022-08-29 1:52 ` xiujianfeng
2022-08-30 11:22 ` [PATCH -next v2 0/6] landlock: add chmod and chown support Mickaël Salaün
2023-04-18 10:53 ` xiujianfeng
2023-04-20 17:40 ` Mickaël Salaün
2023-04-24 8:52 ` xiujianfeng
2023-04-26 13:58 ` Mickaël Salaün
2023-05-05 3:50 ` xiujianfeng
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2e8ecf17-dee3-5e91-b03a-214604dec3fa@huawei.com \
--to=xiujianfeng@huawei.com \
--cc=corbet@lwn.net \
--cc=jmorris@namei.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=mic@digikod.net \
--cc=paul@paul-moore.com \
--cc=serge@hallyn.com \
--cc=shuah@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox