Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp564732ybb; Wed, 25 Mar 2020 05:30:11 -0700 (PDT) X-Google-Smtp-Source: ADFU+vu8SCUoBffjnokbzypAuwWll6dv0PRia6xsCSKxj5+WzQ712FB2cYsLFg54/jUq/6ArG/jR X-Received: by 2002:a4a:3ed7:: with SMTP id t206mr992110oot.61.1585139411432; Wed, 25 Mar 2020 05:30:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585139411; cv=none; d=google.com; s=arc-20160816; b=nOxuSGIPLSp9tAKtPswzK0FYdKo3skVomC2kSPsDboVYT32GiMHVoSlbgjQqYskq0Y KMY1kK/CNv0e/PuqhkXYex+TkkifyrcASIHPQum5wlM57HCf64f6d/ZUwHt2OM95SDXo i6QwzYKvGjaox7NMDePzynjL8G2puwfsGXMBzdvFnQHO27F0Ix4lSVTQ2m+WEY9LbRfD +f7MxVDo760gL0MBuK4033l4h+5L6WEkMWjA7gVODoG8+P3YgrOT8Yqf/HdXo95CCNah KU2xhU1U9wRUGeELWJ6Q9tp5kQn46dmaW2L91jaJovfevp97YMQwIIdOi1eiinsn0EJJ B9hA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=900raWR46tgHDOfPc5pVs6kpLXnkZj9aN4sQMIHjlas=; b=Xtkm2J04WGbCstCoNLuLIj8SYgczBr9ji0pEqIwVPx14CYXkXn77OeFbuHZ4gkx5u9 XbLpOBASA+UajbHmZPBD+N4V4ATsW9z7V9zzbVl3Qj5gRgEoGlSSMD8Oj7zNSOanju+6 g1jfQc6yC7tBhyWwLdf3jHpmR8PmBJTQ5O8WxEo2te428dyB7x0afh6dN6ee07UPFwPl u7wOuTLVWjTPhFBZVYkqcq7wKb9jQAOCDgYh9dTVE4fnMfOWLeltSU/AIty+qRddXZR6 sSLdApECtzxIO5cLXznXsO6LeBSCopS4O6RHq4QQRBMu7Gcdc4LkVFRSbzKL8u/j2I5F mv3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="NkOXrs/g"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u10si10526199oib.91.2020.03.25.05.29.59; Wed, 25 Mar 2020 05:30:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="NkOXrs/g"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727656AbgCYM3Z (ORCPT + 99 others); Wed, 25 Mar 2020 08:29:25 -0400 Received: from us-smtp-delivery-74.mimecast.com ([63.128.21.74]:51816 "EHLO us-smtp-delivery-74.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727407AbgCYM3Y (ORCPT ); Wed, 25 Mar 2020 08:29:24 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1585139362; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=900raWR46tgHDOfPc5pVs6kpLXnkZj9aN4sQMIHjlas=; b=NkOXrs/gxEoOqq/B5ffwpfC3Mes+7UNj4VkPtaOpbP1LXBw/Kym2XXuRxblqhnIA91zDR0 IMswW6BH62UOdFiannZQlWU7Lo66SpuWiC4dU2poPkLz3UAcdTKyAZ/kTFhB8gHdME8iWV gGcmG69VsO4VM3O59s2bx0KYk83Z1Xo= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-298-3SWSe-XBO72xPJI1ZEIDOA-1; Wed, 25 Mar 2020 08:29:20 -0400 X-MC-Unique: 3SWSe-XBO72xPJI1ZEIDOA-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 607A7149C0; Wed, 25 Mar 2020 12:29:18 +0000 (UTC) Received: from madcap2.tricolour.ca (unknown [10.10.110.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 189C192F80; Wed, 25 Mar 2020 12:29:05 +0000 (UTC) Date: Wed, 25 Mar 2020 08:29:03 -0400 From: Richard Guy Briggs To: Paul Moore Cc: Steve Grubb , linux-audit@redhat.com, nhorman@tuxdriver.com, linux-api@vger.kernel.org, containers@lists.linux-foundation.org, LKML , dhowells@redhat.com, netfilter-devel@vger.kernel.org, ebiederm@xmission.com, simo@redhat.com, netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, Eric Paris , mpatel@redhat.com, Serge Hallyn Subject: Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon Message-ID: <20200325122903.obkpyog7fjabzrpf@madcap2.tricolour.ca> References: <3142237.YMNxv0uec1@x2> <20200312202733.7kli64zsnqc4mrd2@madcap2.tricolour.ca> <20200313192306.wxey3wn2h4htpccm@madcap2.tricolour.ca> <20200318214154.ycxy5dl4pxno6fvi@madcap2.tricolour.ca> <20200319214759.qgxt2sfkmd6srdol@madcap2.tricolour.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-03-20 17:56, Paul Moore wrote: > On Thu, Mar 19, 2020 at 5:48 PM Richard Guy Briggs wrote: > > On 2020-03-18 17:47, Paul Moore wrote: > > > On Wed, Mar 18, 2020 at 5:42 PM Richard Guy Briggs wrote: > > > > On 2020-03-18 17:01, Paul Moore wrote: > > > > > On Fri, Mar 13, 2020 at 3:23 PM Richard Guy Briggs wrote: > > > > > > On 2020-03-13 12:42, Paul Moore wrote: > > > > > > > > > > ... > > > > > > > > > > > > The thread has had a lot of starts/stops, so I may be repeating a > > > > > > > previous suggestion, but one idea would be to still emit a "death > > > > > > > record" when the final task in the audit container ID does die, but > > > > > > > block the particular audit container ID from reuse until it the > > > > > > > SIGNAL2 info has been reported. This gives us the timely ACID death > > > > > > > notification while still preventing confusion and ambiguity caused by > > > > > > > potentially reusing the ACID before the SIGNAL2 record has been sent; > > > > > > > there is a small nit about the ACID being present in the SIGNAL2 > > > > > > > *after* its death, but I think that can be easily explained and > > > > > > > understood by admins. > > > > > > > > > > > > Thinking quickly about possible technical solutions to this, maybe it > > > > > > makes sense to have two counters on a contobj so that we know when the > > > > > > last process in that container exits and can issue the death > > > > > > certificate, but we still block reuse of it until all further references > > > > > > to it have been resolved. This will likely also make it possible to > > > > > > report the full contid chain in SIGNAL2 records. This will eliminate > > > > > > some of the issues we are discussing with regards to passing a contobj > > > > > > vs a contid to the audit_log_contid function, but won't eliminate them > > > > > > all because there are still some contids that won't have an object > > > > > > associated with them to make it impossible to look them up in the > > > > > > contobj lists. > > > > > > > > > > I'm not sure you need a full second counter, I imagine a simple flag > > > > > would be okay. I think you just something to indicate that this ACID > > > > > object is marked as "dead" but it still being held for sanity reasons > > > > > and should not be reused. > > > > > > > > Ok, I see your point. This refcount can be changed to a flag easily > > > > enough without change to the api if we can be sure that more than one > > > > signal can't be delivered to the audit daemon *and* collected by sig2. > > > > I'll have a more careful look at the audit daemon code to see if I can > > > > determine this. > > > > > > Maybe I'm not understanding your concern, but this isn't really > > > different than any of the other things we track for the auditd signal > > > sender, right? If we are worried about multiple signals being sent > > > then it applies to everything, not just the audit container ID. > > > > Yes, you are right. In all other cases the information is simply > > overwritten. In the case of the audit container identifier any > > previous value is put before a new one is referenced, so only the last > > signal is kept. So, we only need a flag. Does a flag implemented with > > a rcu-protected refcount sound reasonable to you? > > Well, if I recall correctly you still need to fix the locking in this > patchset so until we see what that looks like it is hard to say for > certain. Just make sure that the flag is somehow protected from > races; it is probably a lot like the "valid" flags you sometimes see > with RCU protected lists. This is like looking for a needle in a haystack. Can you point me to some code that does "valid" flags with RCU protected lists. > > > > Another question occurs to me is that what if the audit daemon is sent a > > > > signal and it cannot or will not collect the sig2 information from the > > > > kernel (SIGKILL?)? Does that audit container identifier remain dead > > > > until reboot, or do we institute some other form of reaping, possibly > > > > time-based? > > > > > > In order to preserve the integrity of the audit log that ACID value > > > would need to remain unavailable until the ACID which contains the > > > associated auditd is "dead" (no one can request the signal sender's > > > info if that container is dead). > > > > I don't understand why it would be associated with the contid of the > > audit daemon process rather than with the audit daemon process itself. > > How does the signal collection somehow get transferred or delegated to > > another member of that audit daemon's container? > > Presumably once we support multiple audit daemons we will need a > struct to contain the associated connection state, with at most one > struct (and one auditd) allowed for a given ACID. I would expect that > the signal sender info would be part of that state included in that > struct. If a task sent a signal to it's associated auditd, and no one > ever queried the signal information stored in the per-ACID state > struct, I would expect that the refcount/flag/whatever would remain > held for the signal sender's ACID until the auditd state's ACID died > (the struct would be reaped as part of the ACID death). In cases > where the container orchestrator blocks sending signals across ACID > boundaries this really isn't an issue as it will all be the same ACID, > but since we don't want to impose any restrictions on what a container > *could* be it is important to make sure we handle the case where the > signal sender's ACID may be different from the associated auditd's > ACID. > > > Thinking aloud here, the audit daemon's exit when it calls audit_free() > > needs to ..._put_sig and cancel that audit_sig_cid (which in the future > > will be allocated per auditd rather than the global it is now since > > there is only one audit daemon). > > > > > paul moore > > > > - RGB > > paul moore - RGB -- Richard Guy Briggs Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635