Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/tests/fs/vfs Redo the access check for setting va_flags in z...



details:   https://anonhg.NetBSD.org/src/rev/90b24ccb1e3e
branches:  trunk
changeset: 994930:90b24ccb1e3e
user:      hannken <hannken%NetBSD.org@localhost>
date:      Wed Nov 28 10:01:28 2018 +0000

description:
Redo the access check for setting va_flags in zfs_netbsd_setattr().

Use user flag UF_NODUMP instead of UF_IMMUTABLE for the test as it
is the only user flag supported by all tested file systems.

PR kern/47656 test zfs_flags.

diffstat:

 external/cddl/osnet/dist/uts/common/fs/zfs/zfs_vnops.c |  51 +++++++----------
 tests/fs/vfs/t_unpriv.c                                |  10 +--
 2 files changed, 26 insertions(+), 35 deletions(-)

diffs (124 lines):

diff -r 60dc25f69e50 -r 90b24ccb1e3e external/cddl/osnet/dist/uts/common/fs/zfs/zfs_vnops.c
--- a/external/cddl/osnet/dist/uts/common/fs/zfs/zfs_vnops.c    Wed Nov 28 09:58:58 2018 +0000
+++ b/external/cddl/osnet/dist/uts/common/fs/zfs/zfs_vnops.c    Wed Nov 28 10:01:28 2018 +0000
@@ -5345,9 +5345,11 @@
        cred_t *cred = ap->a_cred;
        znode_t *zp = VTOZ(vp);
        xvattr_t xvap;
-       u_long fflags;
+       kauth_action_t action;
+       u_long fflags, sfflags = 0;
        uint64_t zflags;
        int error, flags = 0;
+       bool changing_sysflags;
 
        vattr_init_mask(vap);
        vap->va_mask &= ~AT_NOSET;
@@ -5365,40 +5367,14 @@
                fflags = vap->va_flags;
                if ((fflags & ~(SF_IMMUTABLE|SF_APPEND|SF_NOUNLINK|UF_NODUMP)) != 0)
                        return (EOPNOTSUPP);
-               /*
-                * Callers may only modify the file flags on objects they
-                * have VADMIN rights for.
-                */
-               if ((error = VOP_ACCESS(vp, VWRITE, cred)) != 0)
-                       return (error);
-               /*
-                * Unprivileged processes are not permitted to unset system
-                * flags, or modify flags if any system flags are set.
-                * Privileged non-jail processes may not modify system flags
-                * if securelevel > 0 and any existing system flags are set.
-                * Privileged jail processes behave like privileged non-jail
-                * processes if the security.jail.chflags_allowed sysctl is
-                * is non-zero; otherwise, they behave like unprivileged
-                * processes.
-                */
-               if (kauth_authorize_system(cred, KAUTH_SYSTEM_CHSYSFLAGS, 0,
-                       NULL, NULL, NULL) != 0) {
-
-                       if (zflags &
-                           (ZFS_IMMUTABLE | ZFS_APPENDONLY | ZFS_NOUNLINK)) {
-                               return (EPERM);
-                       }
-                       if (fflags &
-                           (SF_IMMUTABLE | SF_APPEND | SF_NOUNLINK)) {
-                               return (EPERM);
-                       }
-               }
 
 #define        FLAG_CHANGE(fflag, zflag, xflag, xfield)        do {            \
        if (((fflags & (fflag)) && !(zflags & (zflag))) ||              \
            ((zflags & (zflag)) && !(fflags & (fflag)))) {              \
                XVA_SET_REQ(&xvap, (xflag));                            \
                (xfield) = ((fflags & (fflag)) != 0);                   \
+               if (((fflag) & SF_SETTABLE) != 0)                       \
+                       sfflags |= (fflag);                             \
        }                                                               \
 } while (0)
                /* Convert chflags into ZFS-type flags. */
@@ -5412,6 +5388,23 @@
                FLAG_CHANGE(UF_NODUMP, ZFS_NODUMP, XAT_NODUMP,
                    xvap.xva_xoptattrs.xoa_nodump);
 #undef FLAG_CHANGE
+
+               action = KAUTH_VNODE_WRITE_FLAGS;
+               changing_sysflags = false;
+
+               if (zflags & (ZFS_IMMUTABLE|ZFS_APPENDONLY|ZFS_NOUNLINK)) {
+                       action |= KAUTH_VNODE_HAS_SYSFLAGS;
+               }
+               if (sfflags != 0) {
+                       action |= KAUTH_VNODE_WRITE_SYSFLAGS;
+                       changing_sysflags = true;
+               }
+
+               error = kauth_authorize_vnode(cred, action, vp, NULL,
+                   genfs_can_chflags(cred, vp->v_type, zp->z_uid,
+                   changing_sysflags));
+               if (error)
+                       return error;
        }
 
        if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
diff -r 60dc25f69e50 -r 90b24ccb1e3e tests/fs/vfs/t_unpriv.c
--- a/tests/fs/vfs/t_unpriv.c   Wed Nov 28 09:58:58 2018 +0000
+++ b/tests/fs/vfs/t_unpriv.c   Wed Nov 28 10:01:28 2018 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: t_unpriv.c,v 1.15 2018/11/28 09:58:58 hannken Exp $    */
+/*     $NetBSD: t_unpriv.c,v 1.16 2018/11/28 10:01:28 hannken Exp $    */
 
 /*-
  * Copyright (c) 2011 The NetBSD Foundation, Inc.
@@ -187,20 +187,18 @@
 
        if (rump_sys_stat(name, &st) == -1)
                atf_tc_fail_errno("stat");
-       if (FSTYPE_ZFS(tc))
-               atf_tc_expect_fail("PR kern/47656: Test known to be broken");
        if (rump_sys_chflags(name, st.st_flags) == -1) {
                if (errno == EOPNOTSUPP)
                        atf_tc_skip("file flags not supported by file system");
                atf_tc_fail_errno("chflags");
        }
 
-       fflags = st.st_flags | UF_IMMUTABLE;
+       fflags = st.st_flags | UF_NODUMP;
 
        rump_pub_lwproc_rfork(RUMP_RFCFDG);
        if (rump_sys_setuid(1) == -1)
                atf_tc_fail_errno("setuid");
-       fflags |= UF_IMMUTABLE;
+       fflags |= UF_NODUMP;
        if (rump_sys_chflags(name, fflags) != -1 || errno != EPERM)
                atf_tc_fail_errno("chflags");
        rump_pub_lwproc_releaselwp();
@@ -208,7 +206,7 @@
        if (rump_sys_chflags(name, fflags) == -1)
                atf_tc_fail_errno("chflags");
 
-       fflags &= ~UF_IMMUTABLE;
+       fflags &= ~UF_NODUMP;
        if (rump_sys_chflags(name, fflags) == -1)
                atf_tc_fail_errno("chflags");
 



Home | Main Index | Thread Index | Old Index