Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7D3ACC64EC4 for ; Fri, 10 Feb 2023 15:33:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232778AbjBJPdo (ORCPT ); Fri, 10 Feb 2023 10:33:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34146 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232772AbjBJPdl (ORCPT ); Fri, 10 Feb 2023 10:33:41 -0500 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DCBA63582 for ; Fri, 10 Feb 2023 07:33:38 -0800 (PST) Received: by mail-pf1-x42c.google.com with SMTP id t17so3726352pfj.0 for ; Fri, 10 Feb 2023 07:33:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore.com; s=google; t=1676043218; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6VZ+XOrSTIecQMUD2x7ocznlsT2yTW/MOJ04EsNi4t4=; b=RAFkY7tjZ7gpsX+JzniHJwHyRn2OOAVHicdiWNikW4iaDl7HUQvIkb1Qo1QW4hYqO2 U1kK3kQBj5mSw5lWE03AvmS38fo/LV24SskyrmRGrvPX/Unof2CNPodLiSF+/zh9Z8nb gts1Ez5CCa44eehhqIa64A6Uui/JO9AhREkxm8FN/gFeTKcNZvdPU0DD27ZQH0s1Txcm bY8FFj88qmY9D9iL539gZ3CsLdzN3fA3/HTmnY0wTPCzv/0QK9f5i6sPr6KgBcprpVSJ TMlYoosY8azDBgKgrxOSTG0C0e+e1OVwDIz5TdVN2fe/NekR4VPrmMPX6DTE2hkpBRqF YyOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1676043218; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6VZ+XOrSTIecQMUD2x7ocznlsT2yTW/MOJ04EsNi4t4=; b=0NipLLMEqARkG0d/hpJboR2mEBO3jDSokRBHNjEuNxksi8q++8/La+dXDDuoDMKF+F eA1jbIa3oiA3IhQfCUs2VREgtVfouo21JkmmygGTowfvlCHs07X30qUTLG8ECVCavi4Y 6lN3Bk64Dd6JWZTHLXc1CZHD0j/KciU+Cukw5uJb1O0tdK3Ok0SQrSlcvvJUFaatRZJH zdyfJmBG38OgNf6MKRx2mZ9jYESgeFKdyfLi3IAWQpxQtlJRMk1xGBgRuC5a7dRCl64c gVn1WtQdzDj/Y82bfdUXgkwA5gs8LO41cowWx+A0JcilQF029Ju4puxKo9U7q5rOk6Uo r7zQ== X-Gm-Message-State: AO0yUKUpH+2ODpOaVRJp5+upn0pWXme5Ah1utBzZqYqWpzFZykmkGsc2 cp7dqwbvaNT9HtmpD9CJoNtNqcoZIfcyJoe5hWxJ X-Google-Smtp-Source: AK7set8WDQ84iFNVjAJNUq6rkApsHXnccnK2E4kViJ2s5HDDWlO2HW8HTcnS2RZWy1SWIRCd7hKhkSxCJMC5kRGL8xg= X-Received: by 2002:a62:5f02:0:b0:5a8:5247:2589 with SMTP id t2-20020a625f02000000b005a852472589mr1395187pfb.7.1676043217708; Fri, 10 Feb 2023 07:33:37 -0800 (PST) MIME-Version: 1.0 References: <13293926.uLZWGnKmhe@x2> In-Reply-To: <13293926.uLZWGnKmhe@x2> From: Paul Moore Date: Fri, 10 Feb 2023 10:33:26 -0500 Message-ID: Subject: Re: [PATCH v2] io_uring,audit: don't log IORING_OP_MADVISE To: Steve Grubb Cc: Richard Guy Briggs , Linux-Audit Mailing List , LKML , io-uring@vger.kernel.org, Eric Paris , Christian Brauner , Stefan Roesch Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 9, 2023 at 5:54 PM Steve Grubb wrote: > On Thursday, February 9, 2023 5:37:22 PM EST Paul Moore wrote: > > On Thu, Feb 9, 2023 at 4:53 PM Richard Guy Briggs wrote: > > > On 2023-02-01 16:18, Paul Moore wrote: > > > > On Wed, Feb 1, 2023 at 3:34 PM Richard Guy Briggs > wrote: > > > > > fadvise and madvise both provide hints for caching or access pattern > > > > > for file and memory respectively. Skip them. > > > > > > > > You forgot to update the first sentence in the commit description :/ > > > > > > I didn't forget. I updated that sentence to reflect the fact that the > > > two should be treated similarly rather than differently. > > > > Ooookay. Can we at least agree that the commit description should be > > rephrased to make it clear that the patch only adjusts madvise? Right > > now I read the commit description and it sounds like you are adjusting > > the behavior for both fadvise and madvise in this patch, which is not > > true. > > > > > > I'm still looking for some type of statement that you've done some > > > > homework on the IORING_OP_MADVISE case to ensure that it doesn't end > > > > up calling into the LSM, see my previous emails on this. I need more > > > > than "Steve told me to do this". > > > > > > > > I basically just want to see that some care and thought has gone into > > > > this patch to verify it is correct and good. > > > > > > Steve suggested I look into a number of iouring ops. I looked at the > > > description code and agreed that it wasn't necessary to audit madvise. > > > The rationale for fadvise was detemined to have been conflated with > > > fallocate and subsequently dropped. Steve also suggested a number of > > > others and after investigation I decided that their current state was > > > correct. *getxattr you've advised against, so it was dropped. It > > > appears fewer modifications were necessary than originally suspected. > > > > My concern is that three of the four changes you initially proposed > > were rejected, which gives me pause about the fourth. You mention > > that based on your reading of madvise's description you feel auditing > > isn't necessary - and you may be right - but based on our experience > > so far with this patchset I would like to hear that you have properly > > investigated all of the madvise code paths, and I would like that in > > the commit description. > > I think you're being unnecessarily hard on this. Asking that a patch author does the proper level of due diligence to ensure that the patch they are submitting is correct isn't being "unnecessarily hard", it's part of being a good code reviewer and maintainer. I'm a bit amazed that you and Richard would rather spend your time arguing about this rather than spending the hour (?) it would take to verify the change and make a proper statement about the correctness of the patch. > Yes, the commit message > might be touched up. But madvise is advisory in nature. It is not security > relevant. And a grep through the security directory doesn't turn up any > hooks. You can't rely on grep, you need to chase the code paths to see what code might be exercised. For example, look at the truncate syscalls (truncate, truncate64, ftruncate64, etc.), if you grep through the SELinux hook code looking for some form of "truncate" you will not find anything relevant; SELinux doesn't provide implementations for either the security_file_truncate() or security_path_truncate() hooks. However, if you follow the syscall code paths you will see that the truncate syscalls end up calling security_inode_permission() which *is* implemented in SELinux. You need to do your homework; relying only on a gut feeling, a few lines from a manpage, or a code comment is a good way to introduce bugs. -- paul-moore.com