[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87vc7t112l.fsf@xmission.com>
Date: Thu, 11 Apr 2013 09:31:14 -0700
From: ebiederm@...ssion.com (Eric W. Biederman)
To: Greg KH <gregkh@...uxfoundation.org>
Cc: linux-kernel@...r.kernel.org, Kay Sievers <kay@...y.org>,
Ming Lei <ming.lei@...onical.com>
Subject: Re: [PATCH] driver core: add uid and gid to devtmpfs
Greg KH <gregkh@...uxfoundation.org> writes:
> On Wed, Apr 10, 2013 at 09:10:12PM -0700, Eric W. Biederman wrote:
>> Greg KH <gregkh@...uxfoundation.org> writes:
>>
>> > From: Kay Sievers <kay@...y.org>
>> >
>> > Some drivers want to tell userspace what uid and gid should be used for
>> > their device nodes, so allow that information to percolate through the
>> > driver core to userspace in order to make this happen. This means that
>> > some systems (i.e. Android and friends) will not need to even run a
>> > udev-like daemon for their device node manager and can just rely in
>> > devtmpfs fully, reducing their footprint even more.
>>
>> This patch is really badly broken in it's uid and gid handling.
>> Nearly every line of this patch is wrong.
>>
>> uids and gids in the kernel need to be stored in kuid_t's and kgid_t's.
>
> Stored, yes, but defined that way as well?
At this point uid_t and gid_t are like __user pointers. Something you
really only want to have in code that is directly interacting with
userspace.
Since there are nice typing properties and no runtime downsides we want
to use kuid_t and kgid_t as much as possible.
What I find is that if I push kuid_t and kgid_t everywhere I find kernel
interfaces that I would never has suspected of using uids and gids.
>> > -static char *block_devnode(struct device *dev, umode_t *mode)
>> > +static char *block_devnode(struct device *dev, umode_t *mode,
>> > + uid_t *uid, gid_t *gid)
>> This needs be kuid_t and kgid_t.
>>
>> > {
>> > struct gendisk *disk = dev_to_disk(dev);
>> >
>> > --- a/drivers/base/core.c
>> > +++ b/drivers/base/core.c
>> > @@ -283,15 +283,21 @@ static int dev_uevent(struct kset *kset,
>> > const char *tmp;
>> > const char *name;
>> > umode_t mode = 0;
>> > + uid_t uid = 0;
>> > + gid_t gid = 0;
>> This needs to be:
>> kuid_t uid = GLOBAL_ROOT_UID;
>> kgid_t gid = GLOBAL_ROOT_GID;
>
> Ok, I'll fix this up and send a follow-on patch, thanks for the review.
>
>>
>> > add_uevent_var(env, "MAJOR=%u", MAJOR(dev->devt));
>> > add_uevent_var(env, "MINOR=%u", MINOR(dev->devt));
>> > - name = device_get_devnode(dev, &mode, &tmp);
>> > + name = device_get_devnode(dev, &mode, &uid, &gid, &tmp);
>> > if (name) {
>> > add_uevent_var(env, "DEVNAME=%s", name);
>> > - kfree(tmp);
>> > if (mode)
>> > add_uevent_var(env, "DEVMODE=%#o", mode & 0777);
>> > + if (uid)
>> > + add_uevent_var(env, "DEVUID=%u", uid);
>> > + if (gid)
>> > + add_uevent_var(env, "DEVGID=%u", gid);
>>
>> Which user namespace are your users in?
>> At the very least this should be:
>> + if (!uid_eq(uid, GLOBAL_ROOT_UID)
>> + add_uevent_var(env, "DEVUID=%u", from_kuid(&init_user_ns, uid));
>> + if (!gid_eq(gid, GLOBAL_ROOT_GID))
>> + add_uevent_var(env, "DEVGID=%u", from_kgid(&init_user_ns, gid));
>>
>> I suppose you can assume your users are in the initial user namespace,
>> as mknod won't work in any other user namespace.
>
> Yes.
>
>> Still it approaches being twisted to have files like
>> /sys/class/net/eth0/uevent that anyone can read that will only return
>> values in the initial user namespace.
>
> As the nodes are only valid in the initial namespace, why would this
> matter?
>
>> > + newattrs.ia_uid = uid;
>> > + newattrs.ia_gid = gid;
>> This doesn't even compile because the types are wrong.
>
> Yes, this has been fixed. But note, it only fails the build if
> namespaces are enabled, and given that no one seems to have reported
> this build error in either the 0-day tester, or linux-next, or the
> distro developers that tested this patch on their systems, it seems that
> no one enables namespaces on their systems :(
Yeah. Not my favorite aspect of this. Although you could call it the
version of CONFIG_EXPERIMENTAL that distros respect.
Right now I have all of the kernel converted to use kuid_t and kgid_t
except for XFS. So there is a config guard that prevents XFS and user
namespaces from being enabled at the same time. Right now allyesconfig
and allmodconfig enable XFS and thus turn off user namespaces.
Hopefully I will get XFS sorted out before too much longer.
Until that happens I have been doing periodic sweeps during the merge
window and after -rc1 to keep things from bit-rotting.
> Again, thanks for the review, I'll go enable namespaces in my test
> kernel and fix up the fallout.
Thanks.
Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists