lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <iufbqsvdp52sgpsjkyulfqgfpvksev3guds5hd556q7zxestgq@ixog46pumnry>
Date: Thu, 3 Apr 2025 04:26:37 +0200
From: Mateusz Guzik <mjguzik@...il.com>
To: Penglei Jiang <superman.xpt@...il.com>
Cc: viro@...iv.linux.org.uk, brauner@...nel.org, jack@...e.cz, 
	linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org, 
	syzbot+5d8e79d323a13aa0b248@...kaller.appspotmail.com
Subject: Re: [PATCH 2/2] vfs: Fix anon_inode triggering VFS_BUG_ON_INODE in
 may_open()

On Wed, Apr 02, 2025 at 06:59:46PM -0700, Penglei Jiang wrote:
> may_open()
> {
>         ...
>         switch (inode->i_mode & S_IFMT) {
>         case S_IFLNK:
>         case S_IFDIR:
>         case S_IFBLK:
>         case S_IFCHR:
>         case S_IFIFO:
>         case S_IFSOCK:
>         case S_IFREG:
>         default:
>                 VFS_BUG_ON_INODE(1, inode);
>         }
>         ...
> }
> 
> Since some anonymous inodes do not have S_IFLNK, S_IFDIR, S_IFBLK,
> S_IFCHR, S_IFIFO, S_IFSOCK, or S_IFREG flags set when created, they
> end up in the default case branch.
> 
> When creating some anon_inode instances, the i_mode in the switch
> statement is not properly set, which causes the open operation to
> follow the default branch when opening anon_inode.
> 
> We could check whether the inode is an anon_inode before VFS_BUG_ON_INODE
> and trigger the assertion only if it's not. However, a more reasonable
> approach might be to set a flag during creation in alloc_anon_inode(),
> such as inode->i_flags |= S_ANON, to explicitly mark anonymous inodes.
> 

I think this is the right step, but there is a missing bit.

The assert was added because of a prior bug report involving ntfs, where
a misconstructed inode did not have an i_mode and was passed to execve.
That eventually landed in may_open() which did not check for MAY_EXEC as
the inode did not fit any of the modes. It was only caught by a
hardening check later.

Note all other cases handle MAY_EXEC.

So I think the safest way forward has 2 steps in the default case:
- detect inodes which purposefully don't have a valid mode and elide the
  assert if so, for example like in your patch
- add the permission check:
	if (acc_mode & MAY_EXEC)
		return -EACCES;

The hardening check comes with a WARN_ON if the inode is not S_ISREG.

No need to hope none of the anon inodes reach it, this should just be
short-circuited.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ