From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1314FECAAD5 for ; Mon, 5 Sep 2022 09:08:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236706AbiIEJIT (ORCPT ); Mon, 5 Sep 2022 05:08:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42670 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234357AbiIEJIS (ORCPT ); Mon, 5 Sep 2022 05:08:18 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BA88A4F690; Mon, 5 Sep 2022 02:08:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 620016118A; Mon, 5 Sep 2022 09:08:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8A450C433D6; Mon, 5 Sep 2022 09:08:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662368896; bh=S2p2RLiAi4qCOG2G2v8yboDeC5W0c2K+DwY7rJTXPE4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=oAodLkEOM0uh9XXgMZ1gMB2ypQ+Jr4jGT+WX2Sm6hs4rY6kJ9FlHK42AISP3LPvO7 SuxEXRjHelJGM0mGwfPh9vvheHyViVXD7rAXRukwnMA+suY0Au1gHhS0PnNg4QDK5t 4/X5aQPCF/D3rZGiNQO7ij28tAFsmMc4lmm9Om1VX8ZDHdVPUzW2WmnfIEcOwUUgwy szAWlZAncDiemkJdYCu44iFFsYlnajlKlZcYbF+c+UjKz/F/W8dZ8044zugYQbowbz +74P5CeiCLJlb1w4bIAs3Ek+Kh+stJQYQmAzXhyPO6ox2YJ+FDxBVkuONtA1Xy1sFv RHXh8nEE0cnSw== Date: Mon, 5 Sep 2022 11:08:11 +0200 From: Christian Brauner To: Ondrej Mosnacek Cc: Alexander Viro , linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, rcu@vger.kernel.org, linux-kernel@vger.kernel.org, Martin Pitt , Vasily Averin Subject: Re: [PATCH 0/2] fs: fix capable() call in simple_xattr_list() Message-ID: <20220905090811.ocnnc53y2bow7m3i@wittgenstein> References: <20220901152632.970018-1-omosnace@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220901152632.970018-1-omosnace@redhat.com> Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org On Thu, Sep 01, 2022 at 05:26:30PM +0200, Ondrej Mosnacek wrote: > The goal of these patches is to avoid calling capable() unconditionally > in simple_xattr_list(), which causes issues under SELinux (see > explanation in the second patch). > > The first patch tries to make this change safer by converting > simple_xattrs to use the RCU mechanism, so that capable() is not called > while the xattrs->lock is held. I didn't find evidence that this is an > issue in the current code, but it can't hurt to make that change > either way (and it was quite straightforward). Hey Ondrey, There's another patchset I'd like to see first which switches from a linked list to an rbtree to get rid of performance issues in this code that can be used to dos tmpfs in containers: https://lore.kernel.org/lkml/d73bd478-e373-f759-2acb-2777f6bba06f@openvz.org I don't think Vasily has time to continue with this so I'll just pick it up hopefully this or the week after LPC. Christian