[PATCH v2 2/2] vfs: avoid duplicating creds in faccessat if possible
Paul Moore
paul at paul-moore.com
Tue Jan 24 17:00:46 UTC 2023
On Tue, Jan 24, 2023 at 5:16 AM Mateusz Guzik <mjguzik at gmail.com> wrote:
> On 1/23/23, Paul Moore <paul at paul-moore.com> wrote:
> > On Fri, Jan 20, 2023 at 7:50 PM Mateusz Guzik <mjguzik at gmail.com> wrote:
> >> On 1/20/23, Paul Moore <paul at paul-moore.com> wrote:
> >> > On Mon, Jan 16, 2023 at 4:21 PM Mateusz Guzik <mjguzik at gmail.com>
> >> > wrote:
> >> >>
> >> >> access(2) remains commonly used, for example on exec:
> >> >> access("/etc/ld.so.preload", R_OK)
> >> >>
> >> >> or when running gcc: strace -c gcc empty.c
> >> >> % time seconds usecs/call calls errors syscall
> >> >> ------ ----------- ----------- --------- --------- ----------------
> >> >> 0.00 0.000000 0 42 26 access
> >> >>
> >> >> It falls down to do_faccessat without the AT_EACCESS flag, which in
> >> >> turn
> >> >> results in allocation of new creds in order to modify fsuid/fsgid and
> >> >> caps. This is a very expensive process single-threaded and most
> >> >> notably
> >> >> multi-threaded, with numerous structures getting refed and unrefed on
> >> >> imminent new cred destruction.
> >> >>
> >> >> Turns out for typical consumers the resulting creds would be identical
> >> >> and this can be checked upfront, avoiding the hard work.
> >> >>
> >> >> An access benchmark plugged into will-it-scale running on Cascade Lake
> >> >> shows:
> >> >> test proc before after
> >> >> access1 1 1310582 2908735 (+121%) # distinct files
> >> >> access1 24 4716491 63822173 (+1353%) # distinct files
> >> >> access2 24 2378041 5370335 (+125%) # same file
> >> >
> >> > Out of curiosity, do you have any measurements of the impact this
> >> > patch has on the AT_EACCESS case when the creds do need to be
> >> > modified?
> >>
> >> I could not be arsed to bench that. I'm not saying there is literally 0
> >> impact, but it should not be high and the massive win in the case I
> >> patched imho justifies it.
> >
> > That's one way to respond to an honest question asking if you've done
> > any tests on the other side of the change. I agree the impact should
> > be less than the advantage you've shown, but sometimes it's nice to
> > see these things.
>
> So reading this now I do think it was worded in quite a poor manner, so
> apologies for that.
Thanks, but no worries. Work in this space long enough and everyone
eventually ends up sending a mail or two that could have been worded
better, myself included.
> Wording aside, I don't know whether this is just a passing remark or
> are you genuinely concerned about the other case.
My main concern is the duplication between the cred check and the cred
override functions leading to a bug at some unknown point in the
future. Changes to credential checking, and access control in
general, always gets my attention and due to past bruises I'm very
sensitive to out-of-sync issues due to code duplication; so your patch
was a bit of a "perfect storm" of concern for me :)
The profiling questions were mainly there as a curiosity since it
looked like this was part of a larger performance oriented effort and
I thought you might have more data that didn't make it into the commit
description.
> >> These funcs are literally next to each other, I don't think that is easy
> >> to miss. I concede a comment in access_override_creds to take a look at
> >> access_need_override_creds would not hurt, but I don't know if a resend
> >> to add it is justified.
> >
> > Perhaps it's because I have to deal with a fair amount of code getting
> > changed in one place and not another, but I would think that a comment
> > would be the least one could do here and would justify a respin.
>
> I'm not going to *insist* on not adding that comment.
>
> Would this work for you?
>
> diff --git a/fs/open.c b/fs/open.c
> index 3c068a38044c..756177b94b04 100644
> --- a/fs/open.c
> +++ b/fs/open.c
> @@ -407,6 +407,11 @@ static const struct cred *access_override_creds(void)
> if (!override_cred)
> return NULL;
>
> + /*
> + * XXX access_need_override_creds performs checks in hopes of
> + * skipping this work. Make sure it stays in sync if making any
> + * changes here.
> + */
> override_cred->fsuid = override_cred->uid;
> override_cred->fsgid = override_cred->gid;
>
> if not, can you phrase it however you see fit for me to copy-paste?
That wording looks good to me and would help me feel a bit better
about this change, thank you.
--
paul-moore.com
More information about the Linux-security-module-archive
mailing list