Re: [PATCH 0/3] userfaultfd: allow to forbid unprivileged users
From: Peter Xu
Date: Wed Mar 13 2019 - 02:00:45 EST
On Tue, Mar 12, 2019 at 12:59:34PM -0700, Mike Kravetz wrote:
> On 3/11/19 2:36 AM, Peter Xu wrote:
> >
> > The "kvm" entry is a bit special here only to make sure that existing
> > users like QEMU/KVM won't break by this newly introduced flag. What
> > we need to do is simply set the "unprivileged_userfaultfd" flag to
> > "kvm" here to automatically grant userfaultfd permission for processes
> > like QEMU/KVM without extra code to tweak these flags in the admin
> > code.
>
> Another user is Oracle DB, specifically with hugetlbfs. For them, we would
> like to add a special case like kvm described above. The admin controls
> who can have access to hugetlbfs, so I think adding code to the open
> routine as in patch 2 of this series would seem to work.
Yes I think if there's an explicit and safe place we can hook for
hugetlbfs then we can do the similar trick as KVM case. Though I
noticed that we can not only create hugetlbfs files under the
mountpoint (which the admin can control), but also using some other
ways. The question (of me... sorry if it's a silly one!) is whether
all other ways to use hugetlbfs is still under control of the admin.
One I know of is memfd_create() which seems to be doable even as
unprivileged users. If so, should we only limit the uffd privilege to
those hugetlbfs users who use the mountpoint directly?
Another question is about fork() of privileged processes - for KVM we
only grant privilege for the exact process that opened the /dev/kvm
node, and the privilege will be lost for any forked childrens. Is
that the same thing for OracleDB/Hugetlbfs?
>
> However, I can imagine more special cases being added for other users. And,
> once you have more than one special case then you may want to combine them.
> For example, kvm and hugetlbfs together.
It looks fine to me if we're using MMF_USERFAULTFD_ALLOW flag upon
mm_struct, since that seems to be a very general flag that can be used
by anything we want to grant privilege for, not only KVM?
Thanks,
--
Peter Xu