[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220901152632.970018-3-omosnace@redhat.com>
Date: Thu, 1 Sep 2022 17:26:32 +0200
From: Ondrej Mosnacek <omosnace@...hat.com>
To: Alexander Viro <viro@...iv.linux.org.uk>
Cc: linux-fsdevel@...r.kernel.org,
linux-security-module@...r.kernel.org, selinux@...r.kernel.org,
rcu@...r.kernel.org, linux-kernel@...r.kernel.org,
Martin Pitt <mpitt@...hat.com>
Subject: [PATCH 2/2] fs: don't call capable() prematurely in simple_xattr_list()
Calling capable() pre-emptively causes a problem for SELinux, which will
normally log a denial whenever capable() is called and the task's
SELinux context doesn't have the corresponding capability permission
allowed.
With the current implementation of simple_xattr_list(), any time a
process without CAP_SYS_ADMIN calls listxattr(2) or similar on a
filesystem that uses this function, a denial is logged even if there are
no trusted.* xattrs on the inode in question. In such situation, policy
writers are forced to chose one of the following options:
1. Grant CAP_SYS_ADMIN to the given SELinux domain even though it
doesn't really need it. (Not good for security.)
2. Add a rule to the policy that will silence CAP_SYS_ADMIN denials for
the given domain without actually granting it. (Not good, because now
denials that make actual difference may be hidden, making
troubleshooting harder.)
3. Do nothing and let the denials appear. (Not good, because the audit
spam could obscure actual important denials.)
To avoid this misery, only call capable() when an actual trusted.* xattr
is encountered. This is somewhat less optimal, since capable() will now
be called once per each trusted.* xattr, but that's pretty unlikely to
matter in practice.
Even after this fix any process listing xattrs on an inode that has one
or more trusted.* ones may trigger an "irrelevant" denial if it doesn't
actually care about the trusted.* xattrs, but such cases should be rare
and thus silencing the denial in such cases would not be as big of a
deal.
Fixes: b09e0fa4b4ea ("tmpfs: implement generic xattr support")
Reported-by: Martin Pitt <mpitt@...hat.com>
Signed-off-by: Ondrej Mosnacek <omosnace@...hat.com>
---
fs/xattr.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/fs/xattr.c b/fs/xattr.c
index fad2344f1168..84a459ac779a 100644
--- a/fs/xattr.c
+++ b/fs/xattr.c
@@ -1155,7 +1155,6 @@ static int xattr_list_one(char **buffer, ssize_t *remaining_size,
ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs,
char *buffer, size_t size)
{
- bool trusted = capable(CAP_SYS_ADMIN);
struct simple_xattr *xattr;
ssize_t remaining_size = size;
int err = 0;
@@ -1180,7 +1179,7 @@ ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs,
rcu_read_lock();
list_for_each_entry_rcu(xattr, &xattrs->head, list) {
/* skip "trusted." attributes for unprivileged callers */
- if (!trusted && xattr_is_trusted(xattr->name))
+ if (xattr_is_trusted(xattr->name) && !capable(CAP_SYS_ADMIN))
continue;
err = xattr_list_one(&buffer, &remaining_size, xattr->name);
--
2.37.2
Powered by blists - more mailing lists