Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp299445pxx; Thu, 29 Oct 2020 03:00:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/2GU3Zj70k3xSuKd/XAq03v7D0rxjTlyGsB+uSEsAg4fN1OgT360j12d/feHpM48ZaDTk X-Received: by 2002:a17:906:9483:: with SMTP id t3mr3423936ejx.390.1603965644726; Thu, 29 Oct 2020 03:00:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603965644; cv=none; d=google.com; s=arc-20160816; b=VJlHy4mhE+XKCPvaTsiG+nBGJ8UJWLkh2TPNlI5oxJSx8kBdlt+xU8cIBEWDHD3PaS zTXk30h2tX3a3eoNeJNhfeQjZNiSQ92TpvLtvZTWk+EYxdjaBP1Fl1y9BgRPk3ltivqM mzy3iJ5gGYv2pTfeU8LsoNTINlsbE4rcJHd8ql7gDbHtSZhfRGlnwzDWTInkNEcgbybb twJVx9jzDANjGozOUpV+A+OHnGm0XXl3DiJ1VGJPpfujuGQvjh3jFa4DxdW1C2YDj2LU iIL8Lbtx7OlXzEz+Z6BGNnq0HFVDGAFmonOhvINoUyTyHVKFd5WyE81VuAJib+RRZRSq yUuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=qt8DJxbLetO1WoXKcxRo5toKKtnSgKB5eVlWB58cOkk=; b=DwNhEo0u36fwOeQAysejPeq523SYbMwO0hotDqCJaC5bMymuYT9W7/Ywq0hTidHQLQ Vm/xbDJU6hSIfDVJiZGbbEa/uZNzcKcOaDlqvsHQ8REl4Pbu3BvnMLUpW9UOQOR6e+gl ZEQ+sWU6tiUeMo3IwEJPRdY5AU2Npwcb2jiaZPjyuYPiEZaGgAfk2gU4XpUW/hJRHcUa Gfm6h0lx+h0874PpZwdWidv+o0SlvfXTQydztkiyGHmRqiLnG7oXOat7a0K6vQzCeyls to1cH/uEOKmeQiZgzcKm5bmk9J0wOV1SNePco0XtkP+iA0XqUL/Jyco/8bp9hE36tvaX A8kQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sargun.me header.s=google header.b=OH+AqmBT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i19si1419844ejc.229.2020.10.29.03.00.22; Thu, 29 Oct 2020 03:00:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@sargun.me header.s=google header.b=OH+AqmBT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390534AbgJ1XfA (ORCPT + 99 others); Wed, 28 Oct 2020 19:35:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38224 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389600AbgJ1Xer (ORCPT ); Wed, 28 Oct 2020 19:34:47 -0400 Received: from mail-lf1-x143.google.com (mail-lf1-x143.google.com [IPv6:2a00:1450:4864:20::143]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B1CB8C0613CF for ; Wed, 28 Oct 2020 16:34:46 -0700 (PDT) Received: by mail-lf1-x143.google.com with SMTP id l28so954971lfp.10 for ; Wed, 28 Oct 2020 16:34:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sargun.me; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qt8DJxbLetO1WoXKcxRo5toKKtnSgKB5eVlWB58cOkk=; b=OH+AqmBT9Kdmi64IsMGc8MSNykUCembPpixPv4zzBrzrPu4ucwFsORVaHkMGcfPA4r 8uCQVHV+8Wyli+9AttwM7qpv4f4tNC2hdEunrUWLLkSkWs0PWOUCa+n8YKIabHg6GLd7 hiwxshPZf7ZvPf+4dweotp+Ny/sGKfx7EeycI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qt8DJxbLetO1WoXKcxRo5toKKtnSgKB5eVlWB58cOkk=; b=FJsO/fzmx8Dr9xjo27sKU5autTwG1RFVnj6Ci1YpLBonEc5NOwSOlJo8vD8mI8H725 x9y1KcelRcRi66g38a+wyNFjX60uYZG+VElJ4QZfMx/7qg5acmkbMXqMVRURm3A4EkUC 2/z9LblDwdyREHwJylth7GIaAzH7apsOeFTt9b+3mpdyUcKGaitHaiu3z+WDvFu5eoKE 5dnPwaftWhyQCziPyGftQjM9PVfl5RoCypk1tO4JlSwX8r9foXyr8xnW/E/We430WYJT /w0vF0EJDTixUZxiuFvBRZSNqaquD4aCwTTBRrRQbIX5vt3UAhqABzkqOsdFJcGLT0fR //xA== X-Gm-Message-State: AOAM533GiYY/cG6nSU4/loUE3vDPZEhS1uwDcBQ7NymW+jJYIKpQQiAS FgYle8h7PbeHzmCeR747Ze2GG+FwGN+toGAvCGyxbDQr4WZZVQPz X-Received: by 2002:a50:fb06:: with SMTP id d6mr6238984edq.312.1603866735356; Tue, 27 Oct 2020 23:32:15 -0700 (PDT) MIME-Version: 1.0 References: <45f07f17-18b6-d187-0914-6f341fe90857@gmail.com> <20200930150330.GC284424@cisco> <8bcd956f-58d2-d2f0-ca7c-0a30f3fcd5b8@gmail.com> <20200930230327.GA1260245@cisco> <20200930232456.GB1260245@cisco> <656a37b5-75e3-0ded-6ba8-3bb57b537b24@gmail.com> In-Reply-To: From: Sargun Dhillon Date: Tue, 27 Oct 2020 23:31:39 -0700 Message-ID: Subject: Re: For review: seccomp_user_notif(2) manual page To: Jann Horn Cc: "Michael Kerrisk (man-pages)" , Tycho Andersen , Kees Cook , Christian Brauner , linux-man , lkml , Aleksa Sarai , Alexei Starovoitov , Will Drewry , bpf , Song Liu , Daniel Borkmann , Andy Lutomirski , Linux Containers , Giuseppe Scrivano , Robert Sesek Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 27, 2020 at 3:28 AM Jann Horn wrote: > > On Tue, Oct 27, 2020 at 7:14 AM Michael Kerrisk (man-pages) > wrote: > > On 10/26/20 4:54 PM, Jann Horn wrote: > > > I'm a bit on the fence now on whether non-blocking mode should use > > > ENOTCONN or not... I guess if we returned ENOENT even when there are > > > no more listeners, you'd have to disambiguate through the poll() > > > revents, which would be kinda ugly? > > > > I must confess, I'm not quite clear on which two cases you > > are trying to distinguish. Can you elaborate? > > Let's say someone writes a program whose responsibilities are just to > handle seccomp events and to listen on some other fd for commands. And > this is implemented with an event loop. Then once all the target > processes are gone (including zombie reaping), we'll start getting > EPOLLERR. > > If NOTIF_RECV starts returning -ENOTCONN at this point, the event loop > can just call into the seccomp logic without any arguments; it can > just call NOTIF_RECV one more time, see the -ENOTCONN, and terminate. > The downside is that there's one more error code userspace has to > special-case. > This would be more consistent with what we'd be doing in the blocking case. > > If NOTIF_RECV keeps returning -ENOENT, the event loop has to also tell > the seccomp logic what the revents are. > > I guess it probably doesn't really matter much. So, in practice, if you're emulating a blocking syscall (such as open, perf_event_open, or any of a number of other syscalls), you probably have to do it on a separate thread in the supervisor because you want to continue to be able to receive new notifications if any other process generates a seccomp notification event that you need to handle. In addition to that, some of these syscalls are preemptible, so you need to poll SECCOMP_IOCTL_NOTIF_ID_VALID to make sure that the program under supervision hasn't left the syscall. If we're to implement a mechanism that makes the seccomp ioctl receive non-blocking, it would be valuable to address this problem as well (getting a notification when the supervisor is processing a syscall and needs to preempt it). In the best case, this can be a minor inconvenience, and in the worst case this can result in weird errors where you're keeping resources open that the container expects to be closed.