[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240502200821.125580570@goodmis.org>
Date: Thu, 02 May 2024 16:08:21 -0400
From: Steven Rostedt <rostedt@...dmis.org>
To: linux-kernel@...r.kernel.org,
linux-trace-kernel@...r.kernel.org
Cc: Masami Hiramatsu <mhiramat@...nel.org>,
Mark Rutland <mark.rutland@....com>,
Mathieu Desnoyers <mathieu.desnoyers@...icios.com>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: [PATCH v3 0/6] tracefs/eventfs: Fix inconsistent permissions
The tracefs and eventfs permissions are created dynamically based
on what the mount point inode has or the instances directory inode has.
But the way it worked had some inconsistencies that could lead to
security issues as the file system is not behaving like admins would
expect.
The files and directories could ignore the remount option that changes
the gid or uid ownerships, leaving files susceptable to access that
is not expected. This happens if a file had its value changed previously
and then a remount changed all the files permissions. The one that
was changed previously would not be affected.
This change set resolves these inconsistencies.
This also fixes the test_ownership.tc test as it would pass on the
first time it is run, but fail on the second time, because of the
inconsistant state of the permissions. Now you can run that test
multiple times and it will always pass.
Changes since v2: https://lore.kernel.org/linux-trace-kernel/20240502151547.973653253@goodmis.org/
- The eventfs_inode freeing was incorrect. The kref_put() would call
release_ei() that freed the contents of the eventfs_inode then
call kfree_rcu() on the eventfs_inode itself. The contents of the
eventfs_inode needs to be freed after the RCU synchronization as
well. The patches here add even more cases where that's a requirement.
- Add a iput callback for the tracefs_inode to clear the TRACEFS_EVENT_INODE
flag. This will prevent the clearing of flags in remount to go into
the eventfs_remount() function. A RCU grace cycle happens between
the clearing of this flag and where the eventfs_inode is freed, so
it is OK if the iteration is happening at the same time, as it is
done under rcu_read_lock().
Changes since v1: https://lore.kernel.org/linux-trace-kernel/20240502030024.062275408@goodmis.org/
- Testing showed that taking a mutex when freeing the tracefs_inode
caused a lockdep splat as it can happen in the RCU softirq context.
Convert the mutex to a spinlock for adding and removing the node
from the link list, and free the node via call_rcu() so that the
iteration of the list only needs to be protected by rcu_read_lock().
Steven Rostedt (Google) (6):
eventfs: Free all of the eventfs_inode after RCU
tracefs: Reset permissions on remount if permissions are options
tracefs: Still use mount point as default permissions for instances
eventfs: Do not differentiate the toplevel events directory
eventfs: Do not treat events directory different than other directories
eventfs: Have "events" directory get permissions from its parent
----
fs/tracefs/event_inode.c | 127 ++++++++++++++++++++++++++++-------------------
fs/tracefs/inode.c | 92 ++++++++++++++++++++++++++++++++--
fs/tracefs/internal.h | 14 ++++--
3 files changed, 175 insertions(+), 58 deletions(-)
Powered by blists - more mailing lists