All of lore.kernel.org
 help / color / mirror / Atom feed
From: Paul Moore <paul@paul-moore.com>
To: Christian Brauner <brauner@kernel.org>
Cc: linux-fsdevel@vger.kernel.org, Seth Forshee <sforshee@kernel.org>,
	Christoph Hellwig <hch@lst.de>, Al Viro <viro@zeniv.linux.org.uk>,
	linux-security-module@vger.kernel.org
Subject: Re: [PATCH v2 16/30] acl: add vfs_get_acl()
Date: Wed, 28 Sep 2022 11:27:07 -0400	[thread overview]
Message-ID: <CAHC9VhReWD=Ru+wqraT9+b8E-8FCoufmH-2z7zKz+sZhXQpMOA@mail.gmail.com> (raw)
In-Reply-To: <20220928151233.f7iqegfk4q6v22fe@wittgenstein>

On Wed, Sep 28, 2022 at 11:12 AM Christian Brauner <brauner@kernel.org> wrote:
> On Wed, Sep 28, 2022 at 10:58:33AM -0400, Paul Moore wrote:
> > On Wed, Sep 28, 2022 at 3:40 AM Christian Brauner <brauner@kernel.org> wrote:
> > >
> > > On Tue, Sep 27, 2022 at 06:55:25PM -0400, Paul Moore wrote:
> > > > On Mon, Sep 26, 2022 at 11:24 AM Christian Brauner <brauner@kernel.org> wrote:
> > > > >
> > > > > In previous patches we implemented get and set inode operations for all
> > > > > non-stacking filesystems that support posix acls but didn't yet
> > > > > implement get and/or set acl inode operations. This specifically
> > > > > affected cifs and 9p.
> > > > >
> > > > > Now we can build a posix acl api based solely on get and set inode
> > > > > operations. We add a new vfs_get_acl() api that can be used to get posix
> > > > > acls. This finally removes all type unsafety and type conversion issues
> > > > > explained in detail in [1] that we aim to get rid of.
> > > > >
> > > > > After we finished building the vfs api we can switch stacking
> > > > > filesystems to rely on the new posix api and then finally switch the
> > > > > xattr system calls themselves to rely on the posix acl api.
> > > > >
> > > > > Link: https://lore.kernel.org/all/20220801145520.1532837-1-brauner@kernel.org [1]
> > > > > Signed-off-by: Christian Brauner (Microsoft) <brauner@kernel.org>
> > > > > ---
> > > > >
> > > > > Notes:
> > > > >     /* v2 */
> > > > >     unchanged
> > > > >
> > > > >  fs/posix_acl.c                  | 131 ++++++++++++++++++++++++++++++--
> > > > >  include/linux/posix_acl.h       |   9 +++
> > > > >  include/linux/posix_acl_xattr.h |  10 +++
> > > > >  3 files changed, 142 insertions(+), 8 deletions(-)
> > > >
> > > > ...
> > > >
> > > > > diff --git a/fs/posix_acl.c b/fs/posix_acl.c
> > > > > index ef0908a4bc46..18873be583a9 100644
> > > > > --- a/fs/posix_acl.c
> > > > > +++ b/fs/posix_acl.c
> > > > > @@ -1369,3 +1439,48 @@ int vfs_set_acl(struct user_namespace *mnt_userns, struct dentry *dentry,
> > > > >         return error;
> > > > >  }
> > > > >  EXPORT_SYMBOL(vfs_set_acl);
> > > > > +
> > > > > +/**
> > > > > + * vfs_get_acl - get posix acls
> > > > > + * @mnt_userns: user namespace of the mount
> > > > > + * @dentry: the dentry based on which to retrieve the posix acls
> > > > > + * @acl_name: the name of the posix acl
> > > > > + *
> > > > > + * This function retrieves @kacl from the filesystem. The caller must all
> > > > > + * posix_acl_release() on @kacl.
> > > > > + *
> > > > > + * Return: On success POSIX ACLs in VFS format, on error negative errno.
> > > > > + */
> > > > > +struct posix_acl *vfs_get_acl(struct user_namespace *mnt_userns,
> > > > > +                             struct dentry *dentry, const char *acl_name)
> > > > > +{
> > > > > +       struct inode *inode = d_inode(dentry);
> > > > > +       struct posix_acl *acl;
> > > > > +       int acl_type, error;
> > > > > +
> > > > > +       acl_type = posix_acl_type(acl_name);
> > > > > +       if (acl_type < 0)
> > > > > +               return ERR_PTR(-EINVAL);
> > > > > +
> > > > > +       /*
> > > > > +        * The VFS has no restrictions on reading POSIX ACLs so calling
> > > > > +        * something like xattr_permission() isn't needed. Only LSMs get a say.
> > > > > +        */
> > > > > +       error = security_inode_getxattr(dentry, acl_name);
> > > > > +       if (error)
> > > > > +               return ERR_PTR(error);
> > > >
> > > > I understand the desire to reuse the security_inode_getxattr() hook
> > > > here, it makes perfect sense, but given that this patchset introduces
> > > > an ACL specific setter hook I think it makes sense to have a matching
> > > > getter hook.  It's arguably a little silly given the current crop of
> > > > LSMs and their approach to ACLs, but if we are going to differentiate
> > > > on the write side I think we might as well be consistent and
> > > > differentiate on the read side as well.
> > >
> > > Sure, I don't mind doing that. I'll add the infrastructure and then the
> > > individual LSMs can add their own hooks.
> >
> > Adding the ACL hook infrastructure, including the call in
> > vfs_get_acl(), without the LSM implementations would result in an
> > access control regression for both SELinux and Smack.  Similar issues
> > with the removexattr hook, although that looks to have IMA/EVM calls
> > too (which may be noops in the case of an ACL, I haven't checked).
> >
> > The good news is that the individual LSM implementations should be
> > trivial, and if you wanted to just have the new ACL hook
> > implementations call into the existing xattr implementations inside
> > each LSM I think that would be okay to start.
>
> Yeah, I realized right after I sent the mail that I'd need to implement
> them. I think I came up with something fairly minimal for all lsms and
> the integrity modules. I folded the trivial patches for adding get, set,
> and remove hooks for the individual modules together to not needlessly
> inflate the security portion of the patchset.

I'll keep an eye out for v3.

-- 
paul-moore.com

  reply	other threads:[~2022-09-28 15:27 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-09-26 14:07 [PATCH v2 00/30] acl: add vfs posix acl api Christian Brauner
2022-09-26 14:07 ` [PATCH v2 01/30] orangefs: rework posix acl handling when creating new filesystem objects Christian Brauner
2022-09-26 14:07 ` [PATCH v2 02/30] fs: pass dentry to set acl method Christian Brauner
2022-09-26 14:08 ` [PATCH v2 03/30] fs: rename current get " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 04/30] fs: add new " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 05/30] cifs: implement " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 06/30] cifs: implement set " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 07/30] 9p: implement get " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 08/30] 9p: implement set " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 09/30] acl: add vfs_set_acl() Christian Brauner
2022-09-26 14:08 ` [PATCH v2 10/30] security: add set acl hook Christian Brauner
2022-09-27 22:55   ` Paul Moore
2022-09-26 14:08 ` [PATCH v2 11/30] selinux: implement " Christian Brauner
2022-09-27 22:55   ` Paul Moore
2022-09-26 14:08 ` [PATCH v2 12/30] smack: " Christian Brauner
2022-09-27 22:56   ` Paul Moore
2022-09-27 23:15   ` Casey Schaufler
2022-09-26 14:08 ` [PATCH v2 13/30] evm: " Christian Brauner
2022-09-27 22:56   ` Paul Moore
2022-09-26 14:08 ` [PATCH v2 14/30] acl: use " Christian Brauner
2022-09-27 22:56   ` Paul Moore
2022-09-26 14:08 ` [PATCH v2 15/30] evm: add post " Christian Brauner
2022-09-27 22:56   ` Paul Moore
2022-09-26 14:08 ` [PATCH v2 16/30] acl: add vfs_get_acl() Christian Brauner
2022-09-27 22:55   ` Paul Moore
2022-09-28  7:40     ` Christian Brauner
2022-09-28 14:58       ` Paul Moore
2022-09-28 15:12         ` Christian Brauner
2022-09-28 15:27           ` Paul Moore [this message]
2022-09-26 14:08 ` [PATCH v2 17/30] acl: add vfs_remove_acl() Christian Brauner
2022-09-27 22:55   ` Paul Moore
2022-09-28  7:41     ` Christian Brauner
2022-09-26 14:08 ` [PATCH v2 18/30] evm: simplify evm_xattr_acl_change() Christian Brauner
2022-09-27 22:56   ` Paul Moore
2022-09-28 13:31     ` Christian Brauner
2022-09-26 14:08 ` [PATCH v2 19/30] ksmbd: use vfs_remove_acl() Christian Brauner
2022-09-26 14:08 ` [PATCH v2 20/30] ecryptfs: implement get acl method Christian Brauner
2022-09-26 14:08 ` [PATCH v2 21/30] ecryptfs: implement set " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 22/30] ovl: implement get " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 23/30] ovl: implement set " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 24/30] ovl: use posix acl api Christian Brauner
2022-09-26 14:08 ` [PATCH v2 25/30] xattr: " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 26/30] ecryptfs: use stub posix acl handlers Christian Brauner
2022-09-26 14:08 ` [PATCH v2 27/30] ovl: " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 28/30] cifs: " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 29/30] 9p: " Christian Brauner
2022-09-26 14:08 ` [PATCH v2 30/30] acl: remove a slew of now unused helpers Christian Brauner
2022-09-27  0:22 ` [PATCH v2 00/30] acl: add vfs posix acl api Casey Schaufler
2022-09-27  7:41   ` Christoph Hellwig
2022-09-27  7:59     ` Christian Brauner
2022-09-27 14:11     ` Casey Schaufler
2022-09-27 15:16       ` Seth Forshee
2022-09-27 15:55         ` Casey Schaufler
2022-09-27 23:24       ` Paul Moore
2022-09-27 23:37         ` Casey Schaufler

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAHC9VhReWD=Ru+wqraT9+b8E-8FCoufmH-2z7zKz+sZhXQpMOA@mail.gmail.com' \
    --to=paul@paul-moore.com \
    --cc=brauner@kernel.org \
    --cc=hch@lst.de \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=sforshee@kernel.org \
    --cc=viro@zeniv.linux.org.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.