Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2506670iob; Fri, 6 May 2022 04:34:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsyle4eVF9PjcmNV/OeJJvPbX7iX2i1ezGaeG/mpbaa2Uo3d1StZ7lo2EpeuIo5BDiasUG X-Received: by 2002:a05:6a00:801:b0:50d:ec66:fac0 with SMTP id m1-20020a056a00080100b0050dec66fac0mr3141948pfk.23.1651836869055; Fri, 06 May 2022 04:34:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651836869; cv=none; d=google.com; s=arc-20160816; b=ngmrQ3R23HH5bYVButQ8/7tKPUsJWeXhOyFnUh++zA8EV8aqrruWa+iROBCj0XQ/lO hWpsS/JwMRpiCPOAUgqxckW7R7yS+8CtW/YhvAN1VfGT3Z+AHGTO2i9Hqko3sAo2Cfri +JZoNRZnTt4PdeUnhxUa08waMiW4xKKZeLxjnZ1dvTocQmDeEGatkqPsgr49qoYTfN5J QstsJDWdOBhZmW1jhh1Dey8FBucrZwGMXI8Cl0e8jB8Bg+ZCF/gPbLpURH4LcxAhftmU gR9cnLC3xkwGzmwD+tYQDEm8Nf/DpJ0ffmcIa70ApRz4FzjwxLYc6z/Iqrw3ILnzR9ZA +xIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=CSu7w+nmnR68Ha0NqVpNUTtYFKouPF6ihnFnZEJDGyU=; b=HEPcYkFV6/xZQXQUym5BtrHTz6YBWbv75OncxLdt82ug3/KBfhQVRPSeP0ZM0b2v6I ArwwpBjLR8JYfoknfZcGRN7Vc4+aLAtCE8hu5AtzqESjZ31bt8QwhgiIq4w1Lal3cziE 38TyIDIDnhiAu+dilTvTj9U7iOmv3u+jn48K5dsRQOFy6ktrZJmqye5JQWAiO/DyVQrh hZVDG7VHHK2o1Fc14Bvbqh6sFVwbZwDWhLQDE63PPALmFE/uBEkttmUbrHbqifknUjBu fHXenQ/QlH05ma5YFIGwS/mB2Aps7WU3/dszK7paXBocTyglxautqc+pWbYoQ3wGVb/S sqqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=K5fed7g1; dkim=neutral (no key) header.i=@suse.cz header.b=3EoBBOdT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s5-20020a170903200500b00158eabc46casi1666286pla.604.2022.05.06.04.34.15; Fri, 06 May 2022 04:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=K5fed7g1; dkim=neutral (no key) header.i=@suse.cz header.b=3EoBBOdT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1380740AbiEEOsm (ORCPT + 99 others); Thu, 5 May 2022 10:48:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237470AbiEEOsk (ORCPT ); Thu, 5 May 2022 10:48:40 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E3C475A2D3; Thu, 5 May 2022 07:44:59 -0700 (PDT) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out2.suse.de (Postfix) with ESMTP id 271261F8D2; Thu, 5 May 2022 14:44:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1651761898; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=CSu7w+nmnR68Ha0NqVpNUTtYFKouPF6ihnFnZEJDGyU=; b=K5fed7g1aYIgkbSwGkw0QyJUSxdLWt2sLIovnqYJzsX3YfyZ8hTY2/9BIaEiPGXWWhjzsT sy49TbSZ2BmYLPQ+1V/PcAo7iZhU4L2+AHDZUrO4G2LCdJ+iB5nnxPSHSIxscLohCoaXxk A2eCSzr+0ke9pS7sQEoum9QnewhaT90= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1651761898; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=CSu7w+nmnR68Ha0NqVpNUTtYFKouPF6ihnFnZEJDGyU=; b=3EoBBOdToRb0kvKHft86VQqshn2r2xcKxXPRldkGmgvw0hmagrg+rxPgj7ayhOJ82LlXJV KoOx4EEJMT4v1IDQ== Received: from quack3.suse.cz (unknown [10.100.224.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id B4A922C142; Thu, 5 May 2022 14:44:57 +0000 (UTC) Received: by quack3.suse.cz (Postfix, from userid 1000) id 6835CA0627; Thu, 5 May 2022 16:44:56 +0200 (CEST) Date: Thu, 5 May 2022 16:44:56 +0200 From: Jan Kara To: Richard Guy Briggs Cc: Paul Moore , Linux-Audit Mailing List , LKML , linux-fsdevel@vger.kernel.org, Eric Paris , Steve Grubb , Jan Kara , Amir Goldstein Subject: Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context Message-ID: <20220505144456.nw6slyqw4pjizl5p@quack3.lan> References: <17660b3f2817e5c0a19d1e9e5d40b53ff4561845.1651174324.git.rgb@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 03-05-22 21:33:35, Richard Guy Briggs wrote: > On 2022-05-02 20:16, Paul Moore wrote: > > On Thu, Apr 28, 2022 at 8:45 PM Richard Guy Briggs wrote: > > > This patch adds 2 structure members to the response returned from user > > > space on a permission event. The first field is 16 bits for the context > > > type. The context type will describe what the meaning is of the second > > > field. The default is none. The patch defines one additional context > > > type which means that the second field is a 32-bit rule number. This > > > will allow for the creation of other context types in the future if > > > other users of the API identify different needs. The second field size > > > is defined by the context type and can be used to pass along the data > > > described by the context. > > > > > > To support this, there is a macro for user space to check that the data > > > being sent is valid. Of course, without this check, anything that > > > overflows the bit field will trigger an EINVAL based on the use of > > > FAN_INVALID_RESPONSE_MASK in process_access_response(). > > > ... > > > static ssize_t fanotify_write(struct file *file, const char __user *buf, size_t count, loff_t *pos) > > > { > > > - struct fanotify_response response = { .fd = -1, .response = -1 }; > > > + struct fanotify_response response; > > > struct fsnotify_group *group; > > > int ret; > > > + size_t size = min(count, sizeof(struct fanotify_response)); > > > > > > if (!IS_ENABLED(CONFIG_FANOTIFY_ACCESS_PERMISSIONS)) > > > return -EINVAL; > > > > > > group = file->private_data; > > > > > > - if (count < sizeof(response)) > > > + if (count < offsetof(struct fanotify_response, extra_info_buf)) > > > return -EINVAL; > > > > Is this why you decided to shrink the fanotify_response:response field > > from 32-bits to 16-bits? I hope not. I would suggest both keeping > > the existing response field as 32-bits and explicitly checking for > > writes that are either the existing/compat length as well as the > > newer, longer length. > > No. I shrank it at Jan's suggestion. I think I agree with you that > the response field should be kept at u32 as it is defined in userspace > and purge the doubt about what would happen with a new userspace with > an old kernel. Hum, for the life of me I cannot find my response you mention here. Can you send a link so that I can refresh my memory? It has been a long time... > > > + > > > +#define FANOTIFY_RESPONSE_EXTRA_LEN_MAX \ > > > + (sizeof(union { \ > > > + struct fanotify_response_audit_rule r; \ > > > + /* add other extra info structures here */ \ > > > + })) > > > + > > > struct fanotify_response { > > > __s32 fd; > > > - __u32 response; > > > + __u16 response; > > > + __u16 extra_info_type; > > > + char extra_info_buf[FANOTIFY_RESPONSE_EXTRA_LEN_MAX]; > > > }; > > > > Since both the kernel and userspace are going to need to agree on the > > content and formatting of the fanotify_response:extra_info_buf field, > > why is it hidden behind a char array? You might as well get rid of > > that abstraction and put the union directly in the fanotify_response > > struct. It is possible you could also get rid of the > > fanotify_response_audit_rule struct this way too and just access the > > rule scalar directly. > > This does make sense and my only concern would be a variable-length > type. There isn't any reason to hide it. If userspace chooses to use > the old interface and omit the type field then it defaults to NONE. > > If future types with variable data are defined, the first field could be > a u32 that unions with the rule number that won't change the struct > size. Struct fanotify_response size must not change, it is part of the kernel ABI. In particular your above change would break userspace code that is currently working just fine (e.g. allocating 8 bytes and expecting struct fanotify_response fits there, or just writing sizeof(struct fanotify_response) as a response while initializing only first 8 bytes). How I'd suggest doing it now (and I'd like to refresh my memory from my past emails you mention because in the past I might have thought something else ;)) is that you add another flag to 'response' field similar to FAN_AUDIT - like FAN_EXTRA_INFO. If that is present, it means extra info is to be expected after struct fanotify_response. The extra info would always start with a header like: struct fanotify_response_info_header { __u8 info_type; __u8 pad; __u16 len; /* This is including the header itself */ } And after such header there would be the 'blob' of data 'len - header size' long. We use this same scheme when passing fanotify events to userspace and it has proven to be lightweight and extensible. It covers the situation when in the future audit would decide it wants other data (just change data type), it would also cover the situation when some other subsystem wants its information passed as well - there can be more structures like this attached at the end, we can process the response up to the length of the write. Now these are just possible future extensions making sure we can extend the ABI without too much pain. In the current implementation I'd just return EINVAL whenever more than FANOTIFY_RESPONSE_MAX_LEN (16 bytes) is written and do very strict checks on what gets passed in. It is also trivially backwards compatible (old userspace on new kernel works just fine). If you want to achieve compatibility of running new userspace on old kernel (I guess that's desirable), we have group flags for that - like we introduced FAN_ENABLE_AUDIT to allow for FAN_AUDIT flag in response we now need to add a flag like FAN_EXTENDED_PERMISSION_INFO telling the kernel it should expect an allow more info returning for permission events. At the same time this is the way for userspace to be able to tell whether the kernel supports this. I know this sounds tedious but that's the cost of extending the ABI in the compatible way. We've made various API mistakes in the past having to add weird workarounds to fanotify and we don't want to repeat those mistakes :). One open question I have is what should the kernel do with 'info_type' in response it does not understand (in the future when there are possibly more different info types). It could just skip it because this should be just additional info for introspection (the only mandatory part is in fanotify_response, however it could surprise userspace that passed info is just getting ignored. To solve this we would have to somewhere report supported info types (maybe in fanotify fdinfo in proc). I guess we'll cross that bridge when we get to it. Amir, what do you think? Honza -- Jan Kara SUSE Labs, CR