From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752439AbdEEAae (ORCPT ); Thu, 4 May 2017 20:30:34 -0400 Received: from zeniv.linux.org.uk ([195.92.253.2]:35866 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750742AbdEEAad (ORCPT ); Thu, 4 May 2017 20:30:33 -0400 Date: Fri, 5 May 2017 01:30:30 +0100 From: Al Viro To: Jann Horn Cc: Linux API , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Linus Torvalds Subject: Re: new ...at() flag: AT_NO_JUMPS Message-ID: <20170505003030.GM29622@ZenIV.linux.org.uk> References: <20170429220414.GT29622@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.7.1 (2016-10-04) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 01, 2017 at 07:36:52PM +0200, Jann Horn wrote: > Oh, nice! > > It looks like this is somewhat similar to the old O_BENEATH proposal, > but because the intentions behind the proposals are different > (application sandboxing versus permitting an application to restrict its > own filesystem accesses), the semantics differ: AT_NO_JUMPS > doesn't prevent starting the path with "/", but does prevent mountpoint > traversal. Is that correct? It prevents both, actually - I missed that in description, but this if (unlikely(nd->flags & LOOKUP_NO_JUMPS)) return -ELOOP; in nd_jump_root() affects absolute pathnames same way as it affects absolute symlinks. It's not quite O_BENEATH, and IMO it's saner that way - a/b/c/../d is bloody well allowed, and so are relative symlinks that do not lead out of the subtree. If somebody has a good argument in favour of flat-out ban on .. (_other_ than "other guys do it that way, and it doesn't need to make sense 'cuz security!!1!!!", please), I'd be glad to hear it. As for mountpoint crossing... it might make sense to split those. O_BENEATH allowed it, and if we want AT_BENEATH to match that - let's do it. Then this one would become AT_BENEATH | AT_XDEV (the latter named after find(1) option, obviously). So how about this: AT_BENEATH: * no absolute pathnames * no absolute symlinks * no procfs-style symlinks * no traversal of .. when we are at the same place where we'd started (dir/../file is allowed, dir/../.. isn't) AT_XDEV: * no mountpoint crossing allowed For the latter I would prefer -EXDEV, for obvious reasons. For the former... not sure. I'm not too happy about -ELOOP, but -EPERM (as with O_BENEATH) is an atrocity - it's even more overloaded. Suggestions?