Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1037342ybb; Fri, 3 Apr 2020 16:58:56 -0700 (PDT) X-Google-Smtp-Source: APiQypKnUMCgDT0hDmzE6rQLn81f2bIUCu87yPVUzUmtylPEYVlDDjJodTStU/9uZbYW0I+AUsEr X-Received: by 2002:a05:6830:1bc9:: with SMTP id v9mr8213052ota.169.1585958336456; Fri, 03 Apr 2020 16:58:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585958336; cv=none; d=google.com; s=arc-20160816; b=Bcz+cDL4kf/bCAMo/cszVLCGHxTzib/yKyUZXL6ZDyNCp30NVO2cPBNAjfMFISnWj+ cG3FEGRKAbnYZLQHkVSkb9v3e9evgW98T/5CM8IFxcAmVm/ZkeDAK+uQKkZ3kKgLalgT 0wmF/XlnSeQQt+ddvrVjU59z0P4AFRnq1cHMcvNVqICxfRHEHn1zatzFpP9twGNteKu1 NUzVixv9xlpksO4UyreqqVLylzRw2Z4RPAFJHmp/gsCBljdAN1rBwsV0b515iK+oBB45 SaZG9eS/pYE5/sniBG5UWWK6qDDh+6xmmYLnInTdHt3BoHPDDM6xrYGL86E6Ey/8LMwz EKzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=UPVAT2L8fukLZnuc3+5vueRjOJrPf8klG/eXO9o8hxw=; b=YaHUawNsMpBXC1gdWDuHzpmRb55nume/7CggBJIICrCFxeA40CLdJGfCvAfZWCDdO3 CIKEbYY6BKtCbPvA6P1pCOaGVRWYsi6fuD8KA6mgwhBXm0AgcAGX6uSlzJLi5PQQJETu YgFIQ8RlU9keEeotRUsZOa1/4/TdK74MyQviTKzoGy9JZccd53ccdJz80Ul6CbojGddb 92YRNGrmSlA1GHCE0ZRHBqyPfrVhIQQRgEbCS0lbEuHu3p1UtiBqTdsEXyC6rDXpF0c4 Dybqp+ZavL7urvSt8PvGOoCKtiXjclO5k6hEaG0mQdPOAmk7UPa2orCc3NGNl26fxA4d 1q7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=QEtE6aol; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e7si4398986otr.95.2020.04.03.16.58.43; Fri, 03 Apr 2020 16:58:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=QEtE6aol; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726373AbgDCX55 (ORCPT + 99 others); Fri, 3 Apr 2020 19:57:57 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:43498 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726060AbgDCX54 (ORCPT ); Fri, 3 Apr 2020 19:57:56 -0400 Received: by mail-pg1-f196.google.com with SMTP id g20so4363993pgk.10 for ; Fri, 03 Apr 2020 16:57:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=UPVAT2L8fukLZnuc3+5vueRjOJrPf8klG/eXO9o8hxw=; b=QEtE6aolufF+32AwcMQjO4gb9bIL99mZp48e8c01C1msnBx3pQym12/IQ+LgE/ux3F CVcMLTu06BWrANlH++15E5ZtzRpx/dHJ2ATqpFT+gejRbnrdSa0e/lZedv2fq2fc1xWF p6HKmiz+g/AW2y250AEiEIm0nKlW0sXeqbLuM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=UPVAT2L8fukLZnuc3+5vueRjOJrPf8klG/eXO9o8hxw=; b=drMcXnB233fubUKSgUuthOhj/DqCUI/0cKavAdisTRpNdORGPLAkIndEvpwq5m90nt f9N+mB0V4nd8y0ieRo87L1kZGVNEriWRHG1WUoXV77s05FrNRCFu00FayY+bOkG718EQ IHN87Qo5CP3cOnJaIL6qWpeF8YpgXDDPf9MimRetsivBuUHJn3j/9U5co3MSRL6Ue06r FYOP7Lf/NWmtDHDXnLm/C7QSNWTO3LELhQkdqw7MJZxl6yUI5naWUGaBxXjtlIcKEPhO 6xENZn25ju1IekQLZvrnCCSNz7I+ANmGWb7F53qHHgE7EYk1JbLJaaaF0uHoM6WjM+Mh nHPw== X-Gm-Message-State: AGi0PuaDm3C4TZ33bAIyRPCwhEVZQWN6OrRAMnAsGjrqNuca36V80R3u +YAST3vE9cVnFnjGnmf1O47n6Q== X-Received: by 2002:a63:ce4a:: with SMTP id r10mr10771972pgi.225.1585958273804; Fri, 03 Apr 2020 16:57:53 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id y131sm6528000pfb.78.2020.04.03.16.57.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Apr 2020 16:57:52 -0700 (PDT) Date: Fri, 3 Apr 2020 16:57:51 -0700 From: Kees Cook To: Luis Chamberlain Cc: Vlastimil Babka , Iurii Zaikin , linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, linux-mm@kvack.org, Ivan Teterevkov , Michal Hocko , David Rientjes , Matthew Wilcox , "Eric W . Biederman" , "Guilherme G . Piccoli" , Alexey Dobriyan , Thomas Gleixner , Greg Kroah-Hartman , Christian Brauner Subject: Re: [PATCH 1/3] kernel/sysctl: support setting sysctl parameters from kernel command line Message-ID: <202004031654.C4389A04EF@keescook> References: <20200330115535.3215-1-vbabka@suse.cz> <20200330115535.3215-2-vbabka@suse.cz> <20200330224422.GX11244@42.do-not-panic.com> <287ac6ae-a898-3e68-c7d8-4c1d17a40db9@suse.cz> <20200402160442.GA11244@42.do-not-panic.com> <202004021017.3A23B759@keescook> <20200402205932.GM11244@42.do-not-panic.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200402205932.GM11244@42.do-not-panic.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 02, 2020 at 08:59:32PM +0000, Luis Chamberlain wrote: > On Thu, Apr 02, 2020 at 10:23:13AM -0700, Kees Cook wrote: > > On Thu, Apr 02, 2020 at 04:04:42PM +0000, Luis Chamberlain wrote: > > > On Wed, Apr 01, 2020 at 01:01:47PM +0200, Vlastimil Babka wrote: > > > > On 3/31/20 12:44 AM, Luis Chamberlain wrote: > > > > >> + } else if (wret != len) { > > > > >> + pr_err("Wrote only %ld bytes of %d writing to proc file %s to set sysctl parameter '%s=%s'", > > > > >> + wret, len, path, param, val); > > > > >> + } > > > > >> + > > > > >> + err = filp_close(file, NULL); > > > > >> + if (err) > > > > >> + pr_err("Error %pe closing proc file to set sysctl parameter '%s=%s'", > > > > >> + ERR_PTR(err), param, val); > > > > >> +out: > > > > >> + kfree(path); > > > > >> + return 0; > > > > >> +} > > > > >> + > > > > >> +void do_sysctl_args(void) > > > > >> +{ > > > > >> + char *command_line; > > > > >> + struct vfsmount *proc_mnt = NULL; > > > > >> + > > > > >> + command_line = kstrdup(saved_command_line, GFP_KERNEL); > > > > > > > > > > can you use kstrndup() ? And then use kfree_const()? Yes, feel free to > > > > > > > > I don't follow, what am I missing? Do you mean this? > > > > > > > > size_t len = strlen(saved_command_line); > > > > command_line = kstrndup(saved_command_line, len, GFP_KERNEL); > > > > > > > > What would be the advantage over plain kstrdup()? > > > > As for kfree_const(), when would command_line be .rodata? I don't see using > > > > kstrndup() resulting in that. > > > > > > The const nature of using kstrdup() comes with using const for your > > > purpose. ie: > > > > > > const char *const_command_line = saved_command_line; > > > > > > The point of a kstrncpy() then is to ensure force a const throughout > > > your use if you know you don't need modifications. > > > > I'm not following this suggestion. It _is_ modifying it. That's why it's > > making a copy. What am I missing? > > We modify the copied bootparams to allow new sysctls to map to old boot params? > > If so, then yes, this cannot be used. I feel like I've lost track of this thread. This strdup is so that the command line can have '\0's injected while it steps through the args (and for doing the . and / replacement). I don't know what you mean by "map" here: this is standard parse_args() usage. > > > > >> + parse_args("Setting sysctl args", command_line, > > > > >> + NULL, 0, -1, -1, &proc_mnt, process_sysctl_arg); > > > > >> + > > > > >> + if (proc_mnt) > > > > >> + kern_unmount(proc_mnt); > > > > >> + > > > > >> + kfree(command_line); > > > > >> +} > > > > > > > > > > Then, can we get this tested as part of lib/test_sysctl.c with its > > > > > respective tools/testing/selftests/sysctl/sysctl.sh ? > > > > > > > > Hmm so I add some sysctl to the test "module" (in fact the 'config' file says it > > > > should be build with 'y', which would be needed anyway) and expand the test > > > > instructions so that the test kernel boot has to include it on the command line, > > > > and then I verify it has been set? Or do you see a better way? > > > > > > We don't necessarily have a way to test the use boot params today. > > > That reveals an are which we should eventually put some focus on > > > in the future. In the meantime we have to deal with what we have. > > > > > > So let's think about this: > > > > > > You are adding a new cmdline sysctl boot param, and also a wrapper > > > for those old boot bootparams to also work using both new sysctl > > > path and old path. Testing just these both should suffice. > > > > > > How about this: > > > > > > For testing the new feature you are adding, can you extend the default > > > boot params *always* if a new CONFIG_TEST_SYSCTL_CMDLINE is set? Then > > > upon boot we can verify the proc handlers for these new boot params got > > > kicked, and likewise some other proc handlers which also can be used > > > from the cmdline are *not* set. For this later set, we already have > > > a series of test syctls you can use. In fact, you can use the existing > > > syctls for both cases already I believe, its just a matter of adding > > > this new CONFIG_TEST_SYSCTL_CMDLINE which would extend the cmdline, > > > and these tests would take place *first* on the script. > > > > This seems... messy. > > It is all we have. > > I'm all for testing this, > > OK so we do want to test it. > > > but I'd rather this not be internally driven. > > This is the least cumbersome solution I could think of. Other things > would require things like using qemu, etc. That seems much more messsy. Yes. Doing an internal extension isn't testing the actual code. > > > This is an external interface (boot params), so > > I'd rather an external driver handle that testing. We don't have a > > common method to do that with the kernel, though. > > Right... which begs the question now -- how do we test this sort of > stuff? The above would at least get us coverage while we iron something > more generic out for boot params. > > > > That would test both cases with one kernel. > > > > > > You could then also add a bogus new sysctl which also expands to a silly > > > raw boot param to test the wrapper you are providing. That would be the > > > only new test syctl you would need to add. > > > > Sure, that seems reasonable. Supporting externally driven testing makes > > sense for this. > > But again, what exactly? I don't think anything is needed for this series. It can be boot tested manually. -- Kees Cook