From: Paul Moore <pmoore@redhat.com>
To: Richard Guy Briggs <rgb@redhat.com>
Cc: linux-audit@redhat.com, ebiederm@xmission.com, eparis@parisplace.org
Subject: Re: [PATCH 2/2] audit: restore AUDIT_LOGINUID unset ABI
Date: Tue, 16 Dec 2014 18:21:27 -0500 [thread overview]
Message-ID: <9657708.RGlUfm0GaS@sifl> (raw)
In-Reply-To: <20141216192004.GA17508@madcap2.tricolour.ca>
On Tuesday, December 16, 2014 02:20:04 PM Richard Guy Briggs wrote:
> On 14/12/12, Paul Moore wrote:
> > On Friday, December 12, 2014 11:44:50 AM Richard Guy Briggs wrote:
> > > On 14/12/12, Paul Moore wrote:
> > > > On Friday, December 12, 2014 12:20:16 AM Richard Guy Briggs wrote:
> > ...
> >
> > > > > diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c
> > > > > index fb4d2df..ea62c7b 100644
> > > > > --- a/kernel/auditfilter.c
> > > > > +++ b/kernel/auditfilter.c
> > > > > @@ -441,6 +441,7 @@ static struct audit_entry
> > > > > *audit_data_to_entry(struct
> > > > > audit_rule_data *data, if ((f->type == AUDIT_LOGINUID) && (f->val ==
> > > > > AUDIT_UID_UNSET)) { f->type = AUDIT_LOGINUID_SET;
> > > > >
> > > > > f->val = 0;
> > > > >
> > > > > + entry->rule.flags |= AUDIT_LOGINUID_LEGACY;
> > > > >
> > > > > }
> > > > >
> > > > > if ((f->type == AUDIT_PID) || (f->type == AUDIT_PPID)) {
> > > > >
> > > > > @@ -592,7 +593,7 @@ static struct audit_rule_data
> > > > > *audit_krule_to_data(struct audit_krule *krule) return NULL;
> > > > >
> > > > > memset(data, 0, sizeof(*data));
> > > > >
> > > > > - data->flags = krule->flags | krule->listnr;
> > > > > + data->flags = (krule->flags & ~AUDIT_LOGINUID_LEGACY) |
> > > > >
> > > > > krule->listnr;
> > > >
> > > > Argh! I missed that the audit_krule->flags end up in
> > > > audit_rule_data->flags.
> > >
> > > Well, it came in that way...
> >
> > Yes, it does, my mistake. I was probably just looking at the structure
> > definition, saw it wasn't exported to userspace, and thought the "flags"
> > field seemed promising.
> >
> > > > Bummer.
> > > >
> > > > Some thoughts:
> > > >
> > > > * Your 1/2 patch saved 32-bits in audit_krule, what are your thoughts
> > > > on adding a new 32-bit bitmap, say "private", which could be used
> > > > internally to track things like this? I'm not a big fan of
> > > > overloading parts of the public API for use by internal mechanisms, it
> > > > almost always gets messy.
> > >
> > > I thought it was going to be messier, but I like how it turned out
> > > cleaner because of the way it was already used.
> >
> > Yes, I think using audit_krule->flags is an improvement over the previous
> > patch, but I think we are better served using a field that doesn't
> > interfere with the userspace API.
>
> But it doesn't interfere. A field is passed in from userspace that is
> multiplexed and has to be filtered anyways into its components in the
> internal representation. It is then combined again on output to
> userspace from more than one source. Arguably, the field passed in from
> userspace it mis-named, since it isn't strictly flags, but a list number
> from zero to five with a flag added just larger than any of the list
> numbers.
>
> The userspace API is not affected.
Maybe I'm reading the code wrong, but it is taking bits away from a bitfield
which is part of the audit API is it not? This is why I don't like this, or
the previous approaches, and why I would prefer to track the "legacy" state in
another private field.
> Would you prefer if I filter the internal flags field with "&
> AUDIT_FILTER_PREPEND" rather than "& ~AUDIT_LOGINUID_LEGACY" to make it
> more clear what is being recombined in audit_krule_to_data()?
If the solution involves filtering out anything before returning the data to
userspace I'm not in favor of the solution (see above).
> > > > * Also, why is there both an audit_krule->flags and
> > > > audit_krule->listnr field? With the exception of the
> > > > AUDIT_FILTER_PREPEND bit are they always going to be the same? I
> > > > wonder if some more cleanup could be done here ...
> > >
> > > This is part of the API. The flags field is used to hand in the list
> > > number and its intended position on the list. Once it gets transferred
> > > from a user data blob to a kernel entry, it is split into listnr and
> > > flags.
> >
> > The question I was trying to ask, perhaps rhetorically at this point, is
> > if there is much/any advantage to spliting the public API flags into the
> > private flags/listnr field. It's probably not worth worrying about in
> > the context of this fix, just something that popped into my head when
> > looking at this fix. In retrospect I probably shouldn't have muddled the
> > discussion with this idea.
>
> Ok, I hadn't understood that you were contemplating leaving that field
> passed from userspace as it was passed in, in the internal
> representation and simply filtering it for necessary information at the
> point of use. That has some merit, but that listnr value is used at
> least a dozen and a half places and would need filtering in each of
> those, slightly complicating/obfuscating the code.
Personally I see it more as a performance issue, rather than an obfuscation
issue. However, as I said earlier, let's not worry about this now; I'd much
rather us stay focused on resolving the LOGINUID issue. It was a mistake on
my part to bring this up in this thread.
> > > I thought it made sense to internally add it to the flags field.
> >
> > I would still like us to use an internal field for tracking things
> > that aren't part of the API.
>
> It *is* and internal field.
Yes, and no. Yes it is internal, but it shares its value with the API. This
is my problem with these patches (see above).
> Internally, the "flags" field is only used for *one* bit, which seems
> like a waste to add another 32-bit field to accomodate another
> single-bit flag.
Considering we just reclaimed a 32-bit field I consider this a zero-sum
change. Perhaps we'll do things differently in the future, this is a private
state flag after all, but right now I'm more comfortable creating a new
private flag field.
> Is it worth turning it into a bitfield to avoid the confusion?
Yes. At least that's my opinion at this point.
> The overhead of doing the filtering on rule creation and deletion seems
> pretty minimal compared to adding a 32-bit field that stays with every
> entry.
The cost of stealing a bit from the public API can be huge.
--
paul moore
security and virtualization @ redhat
next prev parent reply other threads:[~2014-12-16 23:21 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-12-12 5:20 [PATCH 1/2] audit: remove vestiges of vers_ops Richard Guy Briggs
2014-12-12 5:20 ` [PATCH 2/2] audit: restore AUDIT_LOGINUID unset ABI Richard Guy Briggs
2014-12-12 16:39 ` Paul Moore
2014-12-12 16:44 ` Richard Guy Briggs
2014-12-12 19:23 ` Paul Moore
2014-12-16 19:20 ` Richard Guy Briggs
2014-12-16 23:21 ` Paul Moore [this message]
2014-12-12 16:23 ` [PATCH 1/2] audit: remove vestiges of vers_ops Paul Moore
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9657708.RGlUfm0GaS@sifl \
--to=pmoore@redhat.com \
--cc=ebiederm@xmission.com \
--cc=eparis@parisplace.org \
--cc=linux-audit@redhat.com \
--cc=rgb@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox