|
Message-ID: <CAJ0EP43cvBwmpPWWKbro=MzPd356arNrqeXhnuw8h-tpAijPKw@mail.gmail.com> Date: Mon, 19 Jun 2023 20:52:36 -0400 From: Mike Gilbert <floppym@...too.org> To: Rich Felker <dalias@...c.org> Cc: Gabriel Ravier <gabravier@...il.com>, musl@...ts.openwall.com Subject: Re: faccessat behavior on old kernels (<5.8) On Mon, Jun 19, 2023 at 7:59 PM Rich Felker <dalias@...c.org> wrote: > > On Mon, Jun 19, 2023 at 11:49:44PM +0200, Gabriel Ravier wrote: > > On 6/19/23 20:14, Mike Gilbert wrote: > > >I am not subscribed, so please CC me on replies. > > > > > >I received a bug report on Gentoo Linux. > > > > > >https://bugs.gentoo.org/908765 > > > > > >There appears to be a difference in behavior between musl and glibc > > >when running on Linux kernels that lack support for the faccessat2 > > >system call. > > > > > >On glibc, the following call returns 0. On musl, it returns -1 and > > >sets errno to EINVAL. > > > > > >faccessat(AT_FDCWD, "/dev/null", F_OK, AT_SYMLINK_NOFOLLOW); > > > > > >On older kernels, the underlying faccessat2 syscall returns -1 / ENOSYS. > > >glibc follows that up with an fstatat64 with equivalent arguments. > > >musl immediately fails with -1 / EINVAL. > > > > > >Relevant code: > > > > > >https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/unix/sysv/linux/faccessat.c;h=0ccbd778b5f4d61f9121b6aeb59782c21ae647a0;hb=a704fd9a133bfb10510e18702f48a6a9c88dbbd5#l36 > > > > > >https://git.musl-libc.org/cgit/musl/tree/src/unistd/faccessat.c?h=v1.2.4#n34 > > > > To be more precise, the difference is that musl refuses to use its > > fallback when `AT_SYMLINK_NOFOLLOW` is set, whereas glibc does so - > > I don't know if musl's workaround would work in this case, though, > > given how different it is from anything glibc does. > > Yes. Being that AT_SYMLINK_NOFOLLOW is nonstandard functionality for > faccessat, it wasn't even originally implemented. It's available as a > Linux extension if you have a version of Linux that provides a native > syscall to do it, but that's all. > > If there were a compelling reason to emulate it, that could probably > be done, but so far there doesn't seem to have been one. The access > family of functions have inherent TOCTOU races and the generally bad > problem of using the real ids rather than effective ids to compute > access permission. It's almost always better to just attempt the > operation you want rather than using one of the access family. In our use case, we simply want to check if the link exists. We aren't actually doing a permissions check. When the kernel actually supports faccessat2, it is slightly more efficient than fstatat. We started using faccessat here: https://github.com/gentoo/sandbox/commit/382f70b8d93d012648edc7a42087a6d4d5a103eb Assuming musl will not mimic the glibc behavior, I will add this workaround downstream: https://github.com/gentoo/sandbox/pull/7
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.