Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2278883imu; Fri, 14 Dec 2018 08:30:13 -0800 (PST) X-Google-Smtp-Source: AFSGD/WgYiaVs6eZ7jlXezPHMKUOeCWYUpm6+WUUE0N81BKd4gYb6C7qC8tCRPxyvtMxByvThbnD X-Received: by 2002:a17:902:541:: with SMTP id 59mr3569840plf.88.1544805013092; Fri, 14 Dec 2018 08:30:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544805013; cv=none; d=google.com; s=arc-20160816; b=npVoPx368MS3zL0PnGjzpuAqUgnUQgYuIz3p3mbL9QCFJ/xLlHdtsdaOKEgAvkvpm8 /zJ4WbFcwDTmw4hUWnDiBxvxKIkW1Et3mi7AF6nxnqJMtGUblZAgi/c16CuyX3eiU354 9OuhazAWKsFfSjt7P9JjHLfdWyLIAE17QAkoBtOKJj0/aPLTlYE/fGdmi/ieGI36Ozwx IBeYkfRw7YCH5WROQppLUMA0dYg1qzup9QDMx8BBnY1LF00dPTIIz5pYiQyk7OkYhAUw hT/Bb22j/pwwy0bWXHPTJiDc+UMkSItFK2ZXr/MH/eRhIG4XSjnUIum6Am0UXuEBsZe2 y22w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=RR18Rmh6HNz41sSD/lENKhMqnxr8mhDH8cCG89+xMPM=; b=aDYVWeWdjFxPXjYLLwCOD7rpukauRijb8/kySeQE2Rvrh7b19RySq4B00RgVbjWlAB WKXkujOmB+c33YjPw8dhLy6F28HtF8hGMu8oQzNb08M9KUfpeJc4Lwspai/OWpQ9b8AP kig22SQXsXy+882OV9QcfWfRfNBnyDuEtleXj0DcrcEt2gVTuDgvtqtoA1YeH0Du9ZEI xFWcnY+9+Qr+FQtceowxq6+cEk5VOSGlNdzV+1TozB5563Of2we2fEnwm+p6d5B3EAYk zjn0lxqN1IJPGD98ZVIL2r9Y1kNaI+4GcmI5/NuFoqrpTUK1xrKBbKq45L1EIFXLCVBJ vHnA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j66si4624393pfb.182.2018.12.14.08.29.57; Fri, 14 Dec 2018 08:30:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730036AbeLNQ15 (ORCPT + 99 others); Fri, 14 Dec 2018 11:27:57 -0500 Received: from mx1.redhat.com ([209.132.183.28]:60464 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730002AbeLNQ1z (ORCPT ); Fri, 14 Dec 2018 11:27:55 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C0F42307D992; Fri, 14 Dec 2018 16:27:54 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-24.phx2.redhat.com [10.3.112.24]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 73AD819C65; Fri, 14 Dec 2018 16:27:47 +0000 (UTC) Date: Fri, 14 Dec 2018 11:27:44 -0500 From: Richard Guy Briggs To: Paul Moore Cc: linux-fsdevel@vger.kernel.org, viro@zeniv.linux.org.uk, linux-kernel@vger.kernel.org, linux-audit@redhat.com, Eric Paris , sgrubb@redhat.com Subject: Re: [RFC PATCH ghak100 V1 0/2] audit: avoid umount hangs on missing mount Message-ID: <20181214162744.23sbfyl3rnwkgoie@madcap2.tricolour.ca> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.48]); Fri, 14 Dec 2018 16:27:54 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-12-12 08:03, Paul Moore wrote: > On Fri, Nov 16, 2018 at 12:34 PM Richard Guy Briggs wrote: > > On user and remote filesystems, a forced umount can still hang due to > > attemting to fetch the fcaps of a mounted filesystem that is no longer > > available. > > > > These two patches take different approaches to address this, one by > > avoiding the lookup when the MNT_FORCE flag is included, the other by > > providing a method to filter out auditing specified types of filesystems. > > > > This can happen on ceph, cifs, 9p, lustre, fuse (gluster) or NFS. > > > > Arguably the better way to address this issue is to disable auditing > > processes that touch removable filesystems. > > Please see the github issue tracker > > https://github.com/linux-audit/audit-kernel/issues/100 > > > > Richard Guy Briggs (2): > > audit: avoid fcaps on MNT_FORCE > > audit: moar filter PATH records keyed on filesystem magic > > > > fs/namei.c | 2 +- > > fs/namespace.c | 3 +++ > > include/linux/audit.h | 8 ++++++-- > > kernel/audit.c | 5 +++-- > > kernel/audit.h | 2 +- > > kernel/auditsc.c | 29 ++++++++++++++++++++++++++--- > > 6 files changed, 40 insertions(+), 9 deletions(-) > > Just to get this out of the way, don't use "moar", spell it properly. > > Beyond that, it's not clear to me from your cover letter if you are > proposing these patches as an "or" or as an "and"; assuming the > patch(es) are reasonable, do you want us to merge both of these > patches, or only the one we like the most? I would like each one to be considered on its own merits. The second was discussed back when the logs were flooded with "(null)" PATH records due to debugfs and tracefs noise. Do you agree with the general concept or not? The first is being picked apart (rightfully) due to assumptions and choices made long ago in the audit system. So while it is still in far more flux than the second patch, I think it has the potential to fix the problem more correctly and permanently but in the process may challenge our rules about the format and invariability of audit records. The basic premise is to prevent audit from trying to get information (fcaps) from a filesystem that is likely to be far more ephemeral than local on-disk kernel filesystems or to fail to do so more gracefully. > paul moore - RGB -- Richard Guy Briggs Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635