Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp692510iog; Wed, 15 Jun 2022 10:11:55 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sVBO11KpIHNlnRtKkxsRYynOWtEJCACx1K4IhNz22DsmFEwtCY77Fej2WTdRLqyqyl7KxR X-Received: by 2002:a17:903:25d6:b0:168:a88f:44ea with SMTP id jc22-20020a17090325d600b00168a88f44eamr669151plb.28.1655313115584; Wed, 15 Jun 2022 10:11:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655313115; cv=none; d=google.com; s=arc-20160816; b=hS3G/ck2WbsZPF1CzTg0QBAmIh0wwSv2p7WWrGW+bCcXOK5BIViv16y4TW+EPlQ4/l HLhmcxJvWAarQnpBriFeSa2Q2V+w8Ues95bhkU+vwSIOHOaB6Byv0u//NNk2f4NLgC65 qoRxHRXwU6STlxu7Z42EkEC1B/f6Y7CJncgTONcNNclLia7hwfGDjwkvFBCnBZ4q0uYv HcSXxv2hqFbC9EXM3OCtrppUT/hC3NkxZkXUx6VIOVBEL0PkQqHWO0/HBRPOQRiFthRL OA36raOOYm55sxLqfXe5dnjHzKXM1h5Fisa5w2Rlhy+wAleLsqglzHf4+IWm1gFJkMWD dO5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=pr7/sSYVOXPdtGS1/T+T8Lqb0MTvzV5EwQqM4oOBt7M=; b=anu8rT5EnJT45ylD54dEmUrVRuAdRFdQ15E1AccRI/4v5asINqFAMMihieNm/MfesQ Bra3UwoCA8F0X4NiDu+gLKomWOKt0vbTvLqBCjFnAsLrsxSFxtY1S7YxpTwCHfZ3whRX 2ikTciMFx2FUhjRY6NWy6ObpCVE8KBhCZPXNXls9Kc8IpRHb9mQRRXJXHyZ/aXStGV/D t0bItidPov5g1vRhXuFwKM45G1L+VcwcPtcAGktYlFTxttnAs3FiI56E5rfGhfMCGoKW flOrNwifMvxNWSSlguaY2PGBCTv7WIs/lpEKFtm6ni35QG2THAHRpBxwsUNBV0UU0K7X gYaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RGjh36gs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u9-20020a170902e5c900b0015eb18d825dsi20575941plf.461.2022.06.15.10.11.43; Wed, 15 Jun 2022 10:11:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RGjh36gs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349892AbiFORBh (ORCPT + 99 others); Wed, 15 Jun 2022 13:01:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35436 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1355489AbiFORAt (ORCPT ); Wed, 15 Jun 2022 13:00:49 -0400 Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9959050041 for ; Wed, 15 Jun 2022 10:00:27 -0700 (PDT) Received: by mail-wr1-x42b.google.com with SMTP id h5so16261324wrb.0 for ; Wed, 15 Jun 2022 10:00:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=pr7/sSYVOXPdtGS1/T+T8Lqb0MTvzV5EwQqM4oOBt7M=; b=RGjh36gsbSL7V2Cy2m2NjJhaQAc9PMFRxBITRzbJo0e6uQYU2PYDC5NLnQ+yGyDl+R 0zS71FKcfX5hIOSm8TbBXXs4Lfr/g8YMMGK1+H7L0MHHJ4ERPJnOAiuvX9kjV/6/j5Jf 680iSXj86QecnfayPEJekK0udeX/yNBxkmuLB73Bj7pk1WJkjC4f6VHX7hiLma5UpuCU 3V8UHCvzboc1/yrqh8ZW3uLcljQHUwyDtBrjgE/WcQOhhxXOIOYHrY676rcuM4sVZhGn M8SyyBbMOXfe2nTSiGRVqHzLG6gokbEVq5KPRFXRH/NNheY3zwpuJxDGd0jNQRIA3ntp L5Eg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=pr7/sSYVOXPdtGS1/T+T8Lqb0MTvzV5EwQqM4oOBt7M=; b=xeNupooSQLM7SzSarFHNWI/kyvNJ8BgaGrK3IykIiXW5LBPZazg05VfCQzH6RTHlz8 /6ep4F5WdOmx9NJQYCAtheXbJ7nHv+IXYu9SUMjiWtvyXwb51Pnc0+9o4SL2DwFBQG9s yrO0TAZ0Q4tWXLK7u9TVoa0TNHOO/a/rZ9lR37Wo2oa5OnC1xVCLkUMmlMCJzVp+3kt5 E/KAwq5W+TdkeKC52nzuRV70ROd6Rycamed0E3wNhoVa+aVVuUUsWq4wy0Fhm69/gpcv wn4GkvBf5MqP+k7oksc3n8sDLneMDV5TXe2IbG2/sGaSkbJAFXritVCHlcgPq++f265e 1F9w== X-Gm-Message-State: AJIora8WicSILUque12Pxd7pL6c4qUILXlhO8UJU8gO4ZDPd1sPud0fD oAXRNWeq1QH/gHAaj6FdsnFNlLuHrcohf1+1Ibeh/A== X-Received: by 2002:a05:6000:18a9:b0:218:7791:a9ad with SMTP id b9-20020a05600018a900b002187791a9admr777565wri.116.1655312425754; Wed, 15 Jun 2022 10:00:25 -0700 (PDT) MIME-Version: 1.0 References: <20220531212521.1231133-1-kaleshsingh@google.com> <20220531212521.1231133-3-kaleshsingh@google.com> <14f85d24-a9de-9706-32f0-30be4999c71c@oracle.com> <875yll1fp1.fsf@stepbren-lnx.us.oracle.com> <4b79c2ea-dd1a-623d-e5b4-faa732c1a42d@gmail.com> In-Reply-To: From: Kalesh Singh Date: Wed, 15 Jun 2022 10:00:14 -0700 Message-ID: Subject: Re: [Linaro-mm-sig] Re: [PATCH 2/2] procfs: Add 'path' to /proc//fdinfo/ To: =?UTF-8?Q?Christian_K=C3=B6nig?= , Alexander Viro , Christoph Hellwig Cc: Stephen Brennan , Ioannis Ilkos , "T.J. Mercier" , Suren Baghdasaryan , "Cc: Android Kernel" , Jonathan Corbet , Sumit Semwal , =?UTF-8?Q?Christian_K=C3=B6nig?= , Andrew Morton , David Hildenbrand , Christoph Anton Mitterer , Johannes Weiner , Colin Cross , Mike Rapoport , Paul Gortmaker , Randy Dunlap , LKML , linux-fsdevel , "open list:DOCUMENTATION" , Linux Media Mailing List , DRI mailing list , "moderated list:DMA BUFFER SHARING FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 1, 2022 at 8:31 PM Kalesh Singh wrote: > > On Wed, Jun 1, 2022 at 8:02 AM Christian K=C3=B6nig > wrote: > > > > Am 01.06.22 um 00:48 schrieb Stephen Brennan: > > > Kalesh Singh writes: > > >> On Tue, May 31, 2022 at 3:07 PM Stephen Brennan > > >> wrote: > > >>> On 5/31/22 14:25, Kalesh Singh wrote: > > >>>> In order to identify the type of memory a process has pinned throu= gh > > >>>> its open fds, add the file path to fdinfo output. This allows > > >>>> identifying memory types based on common prefixes. e.g. "/memfd...= ", > > >>>> "/dmabuf...", "/dev/ashmem...". > > >>>> > > >>>> Access to /proc//fdinfo is governed by PTRACE_MODE_READ_FSCRE= DS > > >>>> the same as /proc//maps which also exposes the file path of > > >>>> mappings; so the security permissions for accessing path is consis= tent > > >>>> with that of /proc//maps. > > >>> Hi Kalesh, > > >> Hi Stephen, > > >> > > >> Thanks for taking a look. > > >> > > >>> I think I see the value in the size field, but I'm curious about pa= th, > > >>> which is available via readlink /proc//fd/, since those are > > >>> symlinks to the file themselves. > > >> This could work if we are root, but the file permissions wouldn't > > >> allow us to do the readlink on other processes otherwise. We want to > > >> be able to capture the system state in production environments from > > >> some trusted process with ptrace read capability. > > > Interesting, thanks for explaining. It seems weird to have a duplicat= e > > > interface for the same information but such is life. > > > > Yeah, the size change is really straight forward but for this one I'm > > not 100% sure either. > > The 2 concerns I think are: > 1. Fun characters in the path names > 2. If exposing the path is appropriate to begin with. > > One way I think we can address both is to only expose the path for > anon inodes. Then we have well-known path formats and we don't expose > much about which files a process is accessing since these aren't real > paths. > > + if (is_anon_inode(inode)) { > + seq_puts(m, "path:\t"); > + seq_file_path(m, file, "\n"); > + seq_putc(m, '\n'); > + } > > Interested to hear thoughts on it. Adding Christoph, To be able to identify types of shared memory processes pin through FDs in production builds, we would like to add a 'path' field to fdinfo of anon inodes. We could then use the common prefixes ("/dmabuf", "/memfd", ...) to identify different types. Would appreciate any feedback from the FS perspective. Thanks, Kalesh > > > > > Probably best to ping some core fs developer before going further with = it. > > linux-fsdevel is cc'd here. Adding Al Vrio as well. Please let me know > if there are other parties I should include. > > > > > BTW: Any preferred branch to push this upstream? If not I can take it > > through drm-misc-next. > > No other dependencies for this, so drm-misc-next is good. > > Thanks, > Kalesh > > > > > Regards, > > Christian. > > > > > > > >>> File paths can contain fun characters like newlines or colons, whic= h > > >>> could make parsing out filenames in this text file... fun. How woul= d your > > >>> userspace parsing logic handle "/home/stephen/filename\nsize:\t4096= "? The > > >>> readlink(2) API makes that easy already. > > >> I think since we have escaped the "\n" (seq_file_path(m, file, "\n")= ), > > > I really should have read through that function before commenting, > > > thanks for teaching me something new :) > > > > > > Stephen > > > > > >> then user space might parse this line like: > > >> > > >> if (strncmp(line, "path:\t", 6) =3D=3D 0) > > >> char* path =3D line + 6; > > >> > > >> > > >> Thanks, > > >> Kalesh > > >> > > >>> Is the goal avoiding races (e.g. file descriptor 3 is closed and re= opened > > >>> to a different path between reading fdinfo and stating the fd)? > > >>> > > >>> Stephen > > >>> > > >>>> Signed-off-by: Kalesh Singh > > >>>> --- > > >>>> > > >>>> Changes from rfc: > > >>>> - Split adding 'size' and 'path' into a separate patches, per C= hristian > > >>>> - Fix indentation (use tabs) in documentaion, per Randy > > >>>> > > >>>> Documentation/filesystems/proc.rst | 14 ++++++++++++-- > > >>>> fs/proc/fd.c | 4 ++++ > > >>>> 2 files changed, 16 insertions(+), 2 deletions(-) > > >>>> > > >>>> diff --git a/Documentation/filesystems/proc.rst b/Documentation/fi= lesystems/proc.rst > > >>>> index 779c05528e87..591f12d30d97 100644 > > >>>> --- a/Documentation/filesystems/proc.rst > > >>>> +++ b/Documentation/filesystems/proc.rst > > >>>> @@ -1886,14 +1886,16 @@ if precise results are needed. > > >>>> 3.8 /proc//fdinfo/ - Information about opened file > > >>>> --------------------------------------------------------------- > > >>>> This file provides information associated with an opened file. T= he regular > > >>>> -files have at least five fields -- 'pos', 'flags', 'mnt_id', 'ino= ', and 'size'. > > >>>> +files have at least six fields -- 'pos', 'flags', 'mnt_id', 'ino'= , 'size', > > >>>> +and 'path'. > > >>>> > > >>>> The 'pos' represents the current offset of the opened file in de= cimal > > >>>> form [see lseek(2) for details], 'flags' denotes the octal O_xxx= mask the > > >>>> file has been created with [see open(2) for details] and 'mnt_id= ' represents > > >>>> mount ID of the file system containing the opened file [see 3.5 > > >>>> /proc//mountinfo for details]. 'ino' represents the inode n= umber of > > >>>> -the file, and 'size' represents the size of the file in bytes. > > >>>> +the file, 'size' represents the size of the file in bytes, and 'p= ath' > > >>>> +represents the file path. > > >>>> > > >>>> A typical output is:: > > >>>> > > >>>> @@ -1902,6 +1904,7 @@ A typical output is:: > > >>>> mnt_id: 19 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: /dev/null > > >>>> > > >>>> All locks associated with a file descriptor are shown in its fdi= nfo too:: > > >>>> > > >>>> @@ -1920,6 +1923,7 @@ Eventfd files > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:[eventfd] > > >>>> eventfd-count: 5a > > >>>> > > >>>> where 'eventfd-count' is hex value of a counter. > > >>>> @@ -1934,6 +1938,7 @@ Signalfd files > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:[signalfd] > > >>>> sigmask: 0000000000000200 > > >>>> > > >>>> where 'sigmask' is hex value of the signal mask associated > > >>>> @@ -1949,6 +1954,7 @@ Epoll files > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:[eventpoll] > > >>>> tfd: 5 events: 1d data: ffffffffffffffff pos:0= ino:61af sdev:7 > > >>>> > > >>>> where 'tfd' is a target file descriptor number in decimal form, > > >>>> @@ -1968,6 +1974,7 @@ For inotify files the format is the followin= g:: > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:inotify > > >>>> inotify wd:3 ino:9e7e sdev:800013 mask:800afce ignored_mask= :0 fhandle-bytes:8 fhandle-type:1 f_handle:7e9e0000640d1b6d > > >>>> > > >>>> where 'wd' is a watch descriptor in decimal form, i.e. a target = file > > >>>> @@ -1992,6 +1999,7 @@ For fanotify files the format is:: > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:[fanotify] > > >>>> fanotify flags:10 event-flags:0 > > >>>> fanotify mnt_id:12 mflags:40 mask:38 ignored_mask:40000003 > > >>>> fanotify ino:4f969 sdev:800013 mflags:0 mask:3b ignored_mas= k:40000000 fhandle-bytes:8 fhandle-type:1 f_handle:69f90400c275b5b4 > > >>>> @@ -2018,6 +2026,7 @@ Timerfd files > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 0 > > >>>> + path: anon_inode:[timerfd] > > >>>> clockid: 0 > > >>>> ticks: 0 > > >>>> settime flags: 01 > > >>>> @@ -2042,6 +2051,7 @@ DMA Buffer files > > >>>> mnt_id: 9 > > >>>> ino: 63107 > > >>>> size: 32768 > > >>>> + path: /dmabuf: > > >>>> count: 2 > > >>>> exp_name: system-heap > > >>>> > > >>>> diff --git a/fs/proc/fd.c b/fs/proc/fd.c > > >>>> index 464bc3f55759..8889a8ba09d4 100644 > > >>>> --- a/fs/proc/fd.c > > >>>> +++ b/fs/proc/fd.c > > >>>> @@ -60,6 +60,10 @@ static int seq_show(struct seq_file *m, void *v= ) > > >>>> seq_printf(m, "ino:\t%lu\n", file_inode(file)->i_ino); > > >>>> seq_printf(m, "size:\t%lli\n", (long long)file_inode(file)-= >i_size); > > >>>> > > >>>> + seq_puts(m, "path:\t"); > > >>>> + seq_file_path(m, file, "\n"); > > >>>> + seq_putc(m, '\n'); > > >>>> + > > >>>> /* show_fd_locks() never deferences files so a stale value = is safe */ > > >>>> show_fd_locks(m, file, files); > > >>>> if (seq_has_overflowed(m)) > > >>> -- > > >>> To unsubscribe from this group and stop receiving emails from it, s= end an email to kernel-team+unsubscribe@android.com. > > >>> > > > _______________________________________________ > > > Linaro-mm-sig mailing list -- linaro-mm-sig@lists.linaro.org > > > To unsubscribe send an email to linaro-mm-sig-leave@lists.linaro.org > >