Re: [f2fs-dev] [PATCH v2 2/2] f2fs: fix setattr project check upon fssetxattr ioctl

2018-09-10 Thread Chao Yu
On 2018/9/9 17:15, Wang Shilong wrote:
> From: Wang Shilong 
> 
> Currently, project quota could be changed by fssetxattr
> ioctl, and existed permission check inode_owner_or_capable()
> is obviously not enough, just think that common users could
> change project id of file, that could make users to
> break project quota easily.
> 
> This patch try to follow same regular of xfs project
> quota:
> 
> "Project Quota ID state is only allowed to change from
> within the init namespace. Enforce that restriction only
> if we are trying to change the quota ID state.
> Everything else is allowed in user namespaces."
> 
> Besides that, check and set project id'state should
> be an atomic operation, protect whole operation with
> inode lock.
> 
> Signed-off-by: Wang Shilong 

It looks good to me, thanks for the patch, Shilong. :)

Reviewed-by: Chao Yu 

Thanks,


___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel


[f2fs-dev] [PATCH v2 2/2] f2fs: fix setattr project check upon fssetxattr ioctl

2018-09-09 Thread Wang Shilong
From: Wang Shilong 

Currently, project quota could be changed by fssetxattr
ioctl, and existed permission check inode_owner_or_capable()
is obviously not enough, just think that common users could
change project id of file, that could make users to
break project quota easily.

This patch try to follow same regular of xfs project
quota:

"Project Quota ID state is only allowed to change from
within the init namespace. Enforce that restriction only
if we are trying to change the quota ID state.
Everything else is allowed in user namespaces."

Besides that, check and set project id'state should
be an atomic operation, protect whole operation with
inode lock.

Signed-off-by: Wang Shilong 
---
v1->v2: rename f2fs_ioctl_setattr_check_projid()
to f2fs_ioctl_check_project()
---
 fs/f2fs/file.c | 40 +---
 1 file changed, 33 insertions(+), 7 deletions(-)

diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c
index 5474aaa..a55b8a4 100644
--- a/fs/f2fs/file.c
+++ b/fs/f2fs/file.c
@@ -2736,6 +2736,31 @@ static int f2fs_ioc_fsgetxattr(struct file *filp, 
unsigned long arg)
return 0;
 }
 
+static int
+f2fs_ioctl_check_project(struct inode *inode, struct fsxattr *fa)
+{
+   /*
+* Project Quota ID state is only allowed to change from within the init
+* namespace. Enforce that restriction only if we are trying to change
+* the quota ID state. Everything else is allowed in user namespaces.
+*/
+   if (current_user_ns() == &init_user_ns)
+   return 0;
+
+   if (__kprojid_val(F2FS_I(inode)->i_projid) != fa->fsx_projid)
+   return -EINVAL;
+
+   if (F2FS_I(inode)->i_flags & F2FS_PROJINHERIT_FL) {
+   if (!(fa->fsx_xflags & FS_XFLAG_PROJINHERIT))
+   return -EINVAL;
+   } else {
+   if (fa->fsx_xflags & FS_XFLAG_PROJINHERIT)
+   return -EINVAL;
+   }
+
+   return 0;
+}
+
 static int f2fs_ioc_fssetxattr(struct file *filp, unsigned long arg)
 {
struct inode *inode = file_inode(filp);
@@ -2763,19 +2788,20 @@ static int f2fs_ioc_fssetxattr(struct file *filp, 
unsigned long arg)
return err;
 
inode_lock(inode);
+   err = f2fs_ioctl_check_project(inode, &fa);
+   if (err)
+   goto out;
flags = (fi->i_flags & ~F2FS_FL_XFLAG_VISIBLE) |
(flags & F2FS_FL_XFLAG_VISIBLE);
err = __f2fs_ioc_setflags(inode, flags);
-   inode_unlock(inode);
-   mnt_drop_write_file(filp);
if (err)
-   return err;
+   goto out;
 
err = f2fs_ioc_setproject(filp, fa.fsx_projid);
-   if (err)
-   return err;
-
-   return 0;
+out:
+   inode_unlock(inode);
+   mnt_drop_write_file(filp);
+   return err;
 }
 
 int f2fs_pin_file_control(struct inode *inode, bool inc)
-- 
1.8.3.1



___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel