diff mbox series

vfs: reorder checks in may_create_in_sticky

Message ID 20240620120359.151258-1-mjguzik@gmail.com (mailing list archive)
State New
Headers show
Series vfs: reorder checks in may_create_in_sticky | expand

Commit Message

Mateusz Guzik June 20, 2024, 12:03 p.m. UTC
The routine is called for all directories on file creation and weirdly
postpones the check if the dir is sticky to begin with. Instead it first
checks fifos and regular files (in that order), while avoidably pulling
globals.

No functional changes.

Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>
---
 fs/namei.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

Comments

Jan Kara June 20, 2024, 12:46 p.m. UTC | #1
On Thu 20-06-24 14:03:59, Mateusz Guzik wrote:
> The routine is called for all directories on file creation and weirdly
> postpones the check if the dir is sticky to begin with. Instead it first
> checks fifos and regular files (in that order), while avoidably pulling
> globals.
> 
> No functional changes.
> 
> Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>

Yeah, putting the sticky bit check first makes sense also logically. Feel
free to add:

Reviewed-by: Jan Kara <jack@suse.cz>

								Honza

> ---
>  fs/namei.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/fs/namei.c b/fs/namei.c
> index 63d1fb06da6b..b1600060ecfb 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -1246,9 +1246,9 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
>  	umode_t dir_mode = nd->dir_mode;
>  	vfsuid_t dir_vfsuid = nd->dir_vfsuid;
>  
> -	if ((!sysctl_protected_fifos && S_ISFIFO(inode->i_mode)) ||
> -	    (!sysctl_protected_regular && S_ISREG(inode->i_mode)) ||
> -	    likely(!(dir_mode & S_ISVTX)) ||
> +	if (likely(!(dir_mode & S_ISVTX)) ||
> +	    (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> +	    (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
>  	    vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
>  	    vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
>  		return 0;
> -- 
> 2.43.0
>
Christian Brauner June 20, 2024, 1:59 p.m. UTC | #2
On Thu, 20 Jun 2024 14:03:59 +0200, Mateusz Guzik wrote:
> The routine is called for all directories on file creation and weirdly
> postpones the check if the dir is sticky to begin with. Instead it first
> checks fifos and regular files (in that order), while avoidably pulling
> globals.
> 
> No functional changes.
> 
> [...]

The list of checks is unspeakably irritating. I really dislike looking at this
function.

---

Applied to the vfs.misc branch of the vfs/vfs.git tree.
Patches in the vfs.misc branch should appear in linux-next soon.

Please report any outstanding bugs that were missed during review in a
new review to the original patch series allowing us to drop it.

It's encouraged to provide Acked-bys and Reviewed-bys even though the
patch has now been applied. If possible patch trailers will be updated.

Note that commit hashes shown below are subject to change due to rebase,
trailer updates or similar. If in doubt, please check the listed branch.

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs.git
branch: vfs.misc

[1/1] vfs: reorder checks in may_create_in_sticky
      https://git.kernel.org/vfs/vfs/c/6cc620b3a050
Christian Brauner June 21, 2024, 7:45 a.m. UTC | #3
On Thu, Jun 20, 2024 at 02:03:59PM GMT, Mateusz Guzik wrote:
> The routine is called for all directories on file creation and weirdly
> postpones the check if the dir is sticky to begin with. Instead it first
> checks fifos and regular files (in that order), while avoidably pulling
> globals.
> 
> No functional changes.
> 
> Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>
> ---
>  fs/namei.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/fs/namei.c b/fs/namei.c
> index 63d1fb06da6b..b1600060ecfb 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -1246,9 +1246,9 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
>  	umode_t dir_mode = nd->dir_mode;
>  	vfsuid_t dir_vfsuid = nd->dir_vfsuid;
>  
> -	if ((!sysctl_protected_fifos && S_ISFIFO(inode->i_mode)) ||
> -	    (!sysctl_protected_regular && S_ISREG(inode->i_mode)) ||
> -	    likely(!(dir_mode & S_ISVTX)) ||
> +	if (likely(!(dir_mode & S_ISVTX)) ||
> +	    (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> +	    (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
>  	    vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
>  	    vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
>  		return 0;

I think we really need to unroll this unoly mess to make it more readable?

diff --git a/fs/namei.c b/fs/namei.c
index 3e23fbb8b029..1dd2d328bae3 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -1244,25 +1244,43 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
                                struct nameidata *nd, struct inode *const inode)
 {
        umode_t dir_mode = nd->dir_mode;
-       vfsuid_t dir_vfsuid = nd->dir_vfsuid;
+       vfsuid_t dir_vfsuid = nd->dir_vfsuid, i_vfsuid;
+       int ret;
+
+       if (likely(!(dir_mode & S_ISVTX)))
+               return 0;
+
+       if (S_ISREG(inode->i_mode) && !sysctl_protected_regular)
+               return 0;
+
+       if (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos)
+               return 0;
+
+       i_vfsuid = i_uid_into_vfsuid(idmap, inode);
+
+       if (vfsuid_eq(i_vfsuid, dir_vfsuid))
+               return 0;

-       if (likely(!(dir_mode & S_ISVTX)) ||
-           (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
-           (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
-           vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
-           vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
+       if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
                return 0;

-       if (likely(dir_mode & 0002) ||
-           (dir_mode & 0020 &&
-            ((sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) ||
-             (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode))))) {
-               const char *operation = S_ISFIFO(inode->i_mode) ?
-                                       "sticky_create_fifo" :
-                                       "sticky_create_regular";
-               audit_log_path_denied(AUDIT_ANOM_CREAT, operation);
+       if (likely(dir_mode & 0002)) {
+               audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create");
                return -EACCES;
        }
+
+       if (dir_mode & 0020) {
+               if (sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) {
+                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_fifo");
+                       return -EACCES;
+               }
+
+               if (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode)) {
+                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_regular");
+                       return -EACCES;
+               }
+       }
+
        return 0;
 }

That gives us:

static int may_create_in_sticky(struct mnt_idmap *idmap,
				struct nameidata *nd, struct inode *const inode)
{
	umode_t dir_mode = nd->dir_mode;
	vfsuid_t dir_vfsuid = nd->dir_vfsuid, i_vfsuid;
	int ret;

	if (likely(!(dir_mode & S_ISVTX)))
		return 0;

	if (S_ISREG(inode->i_mode) && !sysctl_protected_regular)
		return 0;

	if (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos)
		return 0;

	i_vfsuid = i_uid_into_vfsuid(idmap, inode);

	if (vfsuid_eq(i_vfsuid, dir_vfsuid))
		return 0;

	if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
		return 0;

	if (likely(dir_mode & 0002)) {
		audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create");
		return -EACCES;
	}

	if (dir_mode & 0020) {
		if (sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) {
			audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_fifo");
			return -EACCES;
		}

		if (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode)) {
			audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_regular");
			return -EACCES;
		}
	}

	return 0;
}
Mateusz Guzik June 21, 2024, 11:17 a.m. UTC | #4
On Fri, Jun 21, 2024 at 9:45 AM Christian Brauner <brauner@kernel.org> wrote:
>
> On Thu, Jun 20, 2024 at 02:03:59PM GMT, Mateusz Guzik wrote:
> > The routine is called for all directories on file creation and weirdly
> > postpones the check if the dir is sticky to begin with. Instead it first
> > checks fifos and regular files (in that order), while avoidably pulling
> > globals.
> >
> > No functional changes.
> >
> > Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>
> > ---
> >  fs/namei.c | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> >
> > diff --git a/fs/namei.c b/fs/namei.c
> > index 63d1fb06da6b..b1600060ecfb 100644
> > --- a/fs/namei.c
> > +++ b/fs/namei.c
> > @@ -1246,9 +1246,9 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
> >       umode_t dir_mode = nd->dir_mode;
> >       vfsuid_t dir_vfsuid = nd->dir_vfsuid;
> >
> > -     if ((!sysctl_protected_fifos && S_ISFIFO(inode->i_mode)) ||
> > -         (!sysctl_protected_regular && S_ISREG(inode->i_mode)) ||
> > -         likely(!(dir_mode & S_ISVTX)) ||
> > +     if (likely(!(dir_mode & S_ISVTX)) ||
> > +         (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> > +         (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
> >           vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
> >           vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
> >               return 0;
>
> I think we really need to unroll this unoly mess to make it more readable?
>
> diff --git a/fs/namei.c b/fs/namei.c
> index 3e23fbb8b029..1dd2d328bae3 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -1244,25 +1244,43 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
>                                 struct nameidata *nd, struct inode *const inode)
>  {
>         umode_t dir_mode = nd->dir_mode;
> -       vfsuid_t dir_vfsuid = nd->dir_vfsuid;
> +       vfsuid_t dir_vfsuid = nd->dir_vfsuid, i_vfsuid;
> +       int ret;
> +
> +       if (likely(!(dir_mode & S_ISVTX)))
> +               return 0;
> +
> +       if (S_ISREG(inode->i_mode) && !sysctl_protected_regular)
> +               return 0;
> +
> +       if (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos)
> +               return 0;
> +
> +       i_vfsuid = i_uid_into_vfsuid(idmap, inode);
> +
> +       if (vfsuid_eq(i_vfsuid, dir_vfsuid))
> +               return 0;
>
> -       if (likely(!(dir_mode & S_ISVTX)) ||
> -           (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> -           (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
> -           vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
> -           vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
> +       if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
>                 return 0;
>
> -       if (likely(dir_mode & 0002) ||
> -           (dir_mode & 0020 &&
> -            ((sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) ||
> -             (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode))))) {
> -               const char *operation = S_ISFIFO(inode->i_mode) ?
> -                                       "sticky_create_fifo" :
> -                                       "sticky_create_regular";
> -               audit_log_path_denied(AUDIT_ANOM_CREAT, operation);
> +       if (likely(dir_mode & 0002)) {
> +               audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create");
>                 return -EACCES;
>         }
> +
> +       if (dir_mode & 0020) {
> +               if (sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) {
> +                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_fifo");
> +                       return -EACCES;
> +               }
> +
> +               if (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode)) {
> +                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_regular");
> +                       return -EACCES;
> +               }
> +       }
> +
>         return 0;
>  }
>
> That gives us:
>
> static int may_create_in_sticky(struct mnt_idmap *idmap,
>                                 struct nameidata *nd, struct inode *const inode)
> {
>         umode_t dir_mode = nd->dir_mode;
>         vfsuid_t dir_vfsuid = nd->dir_vfsuid, i_vfsuid;
>         int ret;
>
>         if (likely(!(dir_mode & S_ISVTX)))
>                 return 0;
>
>         if (S_ISREG(inode->i_mode) && !sysctl_protected_regular)
>                 return 0;
>
>         if (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos)
>                 return 0;
>
>         i_vfsuid = i_uid_into_vfsuid(idmap, inode);
>
>         if (vfsuid_eq(i_vfsuid, dir_vfsuid))
>                 return 0;
>
>         if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
>                 return 0;
>
>         if (likely(dir_mode & 0002)) {
>                 audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create");
>                 return -EACCES;
>         }
>
>         if (dir_mode & 0020) {
>                 if (sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) {
>                         audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_fifo");
>                         return -EACCES;
>                 }
>
>                 if (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode)) {
>                         audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_regular");
>                         return -EACCES;
>                 }
>         }
>
>         return 0;
> }

That does look better. :)

So as far as I'm concerned my patch can be just dropped, just in case
I'll note there is no need to mention me anywhere near this.
Jan Kara June 21, 2024, 11:25 a.m. UTC | #5
On Fri 21-06-24 09:45:03, Christian Brauner wrote:
> On Thu, Jun 20, 2024 at 02:03:59PM GMT, Mateusz Guzik wrote:
> > The routine is called for all directories on file creation and weirdly
> > postpones the check if the dir is sticky to begin with. Instead it first
> > checks fifos and regular files (in that order), while avoidably pulling
> > globals.
> > 
> > No functional changes.
> > 
> > Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>
> > ---
> >  fs/namei.c | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> > 
> > diff --git a/fs/namei.c b/fs/namei.c
> > index 63d1fb06da6b..b1600060ecfb 100644
> > --- a/fs/namei.c
> > +++ b/fs/namei.c
> > @@ -1246,9 +1246,9 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
> >  	umode_t dir_mode = nd->dir_mode;
> >  	vfsuid_t dir_vfsuid = nd->dir_vfsuid;
> >  
> > -	if ((!sysctl_protected_fifos && S_ISFIFO(inode->i_mode)) ||
> > -	    (!sysctl_protected_regular && S_ISREG(inode->i_mode)) ||
> > -	    likely(!(dir_mode & S_ISVTX)) ||
> > +	if (likely(!(dir_mode & S_ISVTX)) ||
> > +	    (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> > +	    (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
> >  	    vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
> >  	    vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
> >  		return 0;
> 
> I think we really need to unroll this unoly mess to make it more readable?

I guess my neural network has adapted to these kind of things in the kernel :)

> diff --git a/fs/namei.c b/fs/namei.c
> index 3e23fbb8b029..1dd2d328bae3 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -1244,25 +1244,43 @@ static int may_create_in_sticky(struct mnt_idmap *idmap,
>                                 struct nameidata *nd, struct inode *const inode)
>  {
>         umode_t dir_mode = nd->dir_mode;
> -       vfsuid_t dir_vfsuid = nd->dir_vfsuid;
> +       vfsuid_t dir_vfsuid = nd->dir_vfsuid, i_vfsuid;
> +       int ret;
> +
> +       if (likely(!(dir_mode & S_ISVTX)))
> +               return 0;
> +
> +       if (S_ISREG(inode->i_mode) && !sysctl_protected_regular)
> +               return 0;
> +
> +       if (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos)
> +               return 0;
> +
> +       i_vfsuid = i_uid_into_vfsuid(idmap, inode);
> +
> +       if (vfsuid_eq(i_vfsuid, dir_vfsuid))
> +               return 0;
> 
> -       if (likely(!(dir_mode & S_ISVTX)) ||
> -           (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
> -           (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
> -           vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
> -           vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
> +       if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
>                 return 0;
> 
> -       if (likely(dir_mode & 0002) ||
> -           (dir_mode & 0020 &&
> -            ((sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) ||
> -             (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode))))) {
> -               const char *operation = S_ISFIFO(inode->i_mode) ?
> -                                       "sticky_create_fifo" :
> -                                       "sticky_create_regular";
> -               audit_log_path_denied(AUDIT_ANOM_CREAT, operation);
> +       if (likely(dir_mode & 0002)) {
> +               audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create");
>                 return -EACCES;
>         }
> +
> +       if (dir_mode & 0020) {
> +               if (sysctl_protected_fifos >= 2 && S_ISFIFO(inode->i_mode)) {
> +                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_fifo");
> +                       return -EACCES;
> +               }
> +
> +               if (sysctl_protected_regular >= 2 && S_ISREG(inode->i_mode)) {
> +                       audit_log_path_denied(AUDIT_ANOM_CREAT, "sticky_create_regular");
> +                       return -EACCES;
> +               }
> +       }
> +
>         return 0;
>  }

But this definitely looks nicer to read... Feel free to add:

Reviewed-by: Jan Kara <jack@suse.cz>

								Honza
diff mbox series

Patch

diff --git a/fs/namei.c b/fs/namei.c
index 63d1fb06da6b..b1600060ecfb 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -1246,9 +1246,9 @@  static int may_create_in_sticky(struct mnt_idmap *idmap,
 	umode_t dir_mode = nd->dir_mode;
 	vfsuid_t dir_vfsuid = nd->dir_vfsuid;
 
-	if ((!sysctl_protected_fifos && S_ISFIFO(inode->i_mode)) ||
-	    (!sysctl_protected_regular && S_ISREG(inode->i_mode)) ||
-	    likely(!(dir_mode & S_ISVTX)) ||
+	if (likely(!(dir_mode & S_ISVTX)) ||
+	    (S_ISREG(inode->i_mode) && !sysctl_protected_regular) ||
+	    (S_ISFIFO(inode->i_mode) && !sysctl_protected_fifos) ||
 	    vfsuid_eq(i_uid_into_vfsuid(idmap, inode), dir_vfsuid) ||
 	    vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
 		return 0;