From nobody Thu May 23 02:41:56 2024 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4VlC9w5ltKz5LYtY; Thu, 23 May 2024 02:41:56 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4VlC9w40hBz42dR; Thu, 23 May 2024 02:41:56 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1716432116; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=eFa41nT7sMbFZCZ6armDW6yGlfLOs3YlR5OkDKMaxNU=; b=ftsJ1uU949pASCkStKD+Wleq53Kfgx1Cq6/sW+s5HVaqoKsYonEHs4YcNLPne383Bx/q4K VsSzd1497CDqwT2slii8nKNoFHIDc3EGqRVqi22wMZ08BEBj3RIoOqzfr11bFPOdcmVmEr 51Ock5wp5HBLqyJ6QYu2Qy/E2BpyB1pMriudO6+57lKGgbfD3CGs206pHMuvR/+lfjJcAm AHkZZEcjCOGIlwRPLCWbkEFSUmBFVFOTDDz83t8X3hRPmFFkbxGRs65ZeZNOHe/nbjr4Z9 PNJT38V+w8ZAxmvuYP68M4t8x3Le6YQAjjtsmBPwVK27/GLeL08NzrxSctAdBw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1716432116; a=rsa-sha256; cv=none; b=Zimremh+n/W6/rGUec6irJ0lrdSEjx1Qw8PEJ7ctZgQaeh5jkxmEW6hxhhMjN3xX/9iTT/ 9l1ZLdiiA4+Uq/bXq387A6Qa32nEvbWJKRdaY75YMFRJXg0mks8cVmyyKS+8mu475CFK+3 rhfMbGROJ5HXik3jSWDpZi13qGWTlxjPVajQu5KmJFHPSyEWqPeRB6dYtwCmBIXNMAmqgu sHPGt93ZmzZLcKaI0KvDuuw6/xkOY5x0aqTy9pXwlBzvTi2zujwj2DwuWymNrXFTqIwmos KbumMuc9a3b7b8gF6xwcBdOP2TegVkj84tVyxju1dQSubT60lGpzfpil7iUC0g== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1716432116; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=eFa41nT7sMbFZCZ6armDW6yGlfLOs3YlR5OkDKMaxNU=; b=EWnzTjkfTjruBaXTjh1KtcxfeaTIB0ey19rps1lmYNidjhLQHFff4ZrcbVu2y2BXU9t9yY Q+zrzKxwaUDOmkImBKFmkOFlZWS7IBuJFGrDV/l15/73OV5bbnCKgxO2Y9x6JAyJb+movk jEdQgSAWB6mhkX1nw9wBQk9gXumIlx929RqYG0ggCwhuDA7pC7OrzxzU8AIqmigRPNvoiN BrJdMIXetcNAhr6f2qYjTSs+A5YENQziNTi4yWFqXVAkIS/14Iyu1lqmGtw5AVbD+I2OzF C0DN13TPgqpqVB02yvMnFAzhEkIh1KiKmimLcnIhTuzyHQXs0Zi231baBb8rLw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4VlC9w3cLJzXQH; Thu, 23 May 2024 02:41:56 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 44N2fuDa054248; Thu, 23 May 2024 02:41:56 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 44N2fuAf054245; Thu, 23 May 2024 02:41:56 GMT (envelope-from git) Date: Thu, 23 May 2024 02:41:56 GMT Message-Id: <202405230241.44N2fuAf054245@gitrepo.freebsd.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: Dag-Erling =?utf-8?Q?Sm=C3=B8rgrav?= Subject: git: 79b39f23e134 - stable/14 - access(2): Discourage use of these system calls. List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-all@freebsd.org Sender: owner-dev-commits-src-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: des X-Git-Repository: src X-Git-Refname: refs/heads/stable/14 X-Git-Reftype: branch X-Git-Commit: 79b39f23e1341bdc3ab9c6a08e1506d40b8b6dbc Auto-Submitted: auto-generated The branch stable/14 has been updated by des: URL: https://cgit.FreeBSD.org/src/commit/?id=79b39f23e1341bdc3ab9c6a08e1506d40b8b6dbc commit 79b39f23e1341bdc3ab9c6a08e1506d40b8b6dbc Author: Dag-Erling Smørgrav AuthorDate: 2024-05-21 22:35:22 +0000 Commit: Dag-Erling Smørgrav CommitDate: 2024-05-23 02:41:32 +0000 access(2): Discourage use of these system calls. Fixes: 421025a274fb PR: 262895 MFC after: 3 days Reviewed by: emaste Differential Revision: https://reviews.freebsd.org/D45240 (cherry picked from commit a4be1eb21165d7aedae9dc6634528619ff10d025) --- lib/libc/sys/access.2 | 105 ++++++++++++++++++++++++-------------------------- 1 file changed, 50 insertions(+), 55 deletions(-) diff --git a/lib/libc/sys/access.2 b/lib/libc/sys/access.2 index 64ed1133b23d..8595444720b1 100644 --- a/lib/libc/sys/access.2 +++ b/lib/libc/sys/access.2 @@ -27,7 +27,7 @@ .\" .\" @(#)access.2 8.2 (Berkeley) 4/1/94 .\" -.Dd May 13, 2024 +.Dd May 21, 2024 .Dt ACCESS 2 .Os .Sh NAME @@ -47,35 +47,43 @@ .Fn faccessat "int fd" "const char *path" "int mode" "int flag" .Sh DESCRIPTION The -.Fn access -and +.Fn access , .Fn eaccess -system calls check the accessibility of the -file named by -the +and +.Fn faccessat +system calls report whether an attempt to access the file designated +by their .Fa path -argument -for the access permissions indicated by -the +in the manner described by their .Fa mode -argument. +argument is likely to succeed. The value of .Fa mode -is either the bitwise-inclusive OR of the access permissions to be -checked -.Dv ( R_OK +is either the bitwise-inclusive OR of the desired permissions +.Po +.Dv R_OK for read permission, .Dv W_OK for write permission, and .Dv X_OK -for execute/search permission), -or the existence test -.Pq Dv F_OK . +for execute / search permission +.Pc +or +.Dv F_OK +to simply check whether the file exists. .Pp -For additional information, see the -.Sx "File Access Permission" -section of -.Xr intro 2 . +For a number of reasons, these system calls cannot be relied upon to +give a correct and definitive answer. +They can at best provide an early indication of the expected outcome, +to be confirmed by actually attempting the operation. +For existence checks, either +.Xr stat 2 +or +.Xr lstat 2 +should be used instead. +See also +.Sx SECURITY CONSIDERATIONS +below. .Pp The .Fn eaccess @@ -89,6 +97,13 @@ the real user ID in place of the effective user ID, the real group ID in place of the effective group ID, and the rest of the group access list. .Pp +See the +.Sx DEFINITIONS +section of +.Xr intro 2 +for additional information on file access permissions and real +vs. effective user and group IDs. +.Pp The .Fn faccessat system call is equivalent to @@ -116,8 +131,10 @@ list, defined in .In fcntl.h : .Bl -tag -width indent .It Dv AT_EACCESS -The checks for accessibility are performed using the effective user and group -IDs instead of the real user and group ID as required in a call to +The checks are performed using the effective user and group IDs, +like +.Fn eaccess , +instead of the real user and group ID, like .Fn access . .It Dv AT_RESOLVE_BENEATH Only walk paths below the directory specified by the @@ -149,23 +166,15 @@ Likewise for .Dv R_OK and .Dv W_OK . -.Pp -.Fn access , -.Fn eaccess -and -.Fn faccessat -will always dereference symbolic links. -If the symbolic link itself needs to be referenced, -.Xr lstat 2 -should be used instead. .Sh RETURN VALUES .Rv -std .Sh ERRORS +The .Fn access , .Fn eaccess , -or +and .Fn faccessat -will fail if: +system calls may fail if: .Bl -tag -width Er .It Bq Er EINVAL The value of the @@ -256,25 +265,11 @@ system call appeared in .Fx 8.0 . .Sh SECURITY CONSIDERATIONS The -.Fn access -system call -is a potential security hole due to race conditions and -should never be used. -Set-user-ID and set-group-ID applications should restore the -effective user or group ID, -and perform actions directly rather than use -.Fn access -to simulate access checks for the real user or group ID. -The -.Fn eaccess -system call -likewise may be subject to races if used inappropriately. -.Pp -.Fn access -remains useful for providing clues to users as to whether operations -make sense for particular filesystem objects (e.g. 'delete' menu -item only highlighted in a writable folder ... avoiding interpretation -of the st_mode bits that the application might not understand -- -e.g. in the case of AFS). -It also allows a cheaper file existence test than -.Xr stat 2 . +.Fn access , +.Fn eaccess , +and +.Fn faccessat +system calls are subject to time-of-check-to-time-of-use races and +should not be relied upon for file permission enforcement purposes. +Instead, applications should perform the desired action using the +requesting user's credentials.