From: Paul Moore <paul@paul-moore.com>
To: "Serge E. Hallyn" <serge@hallyn.com>
Cc: Casey Schaufler <casey@schaufler-ca.com>,
linux-security-module@vger.kernel.org
Subject: Re: [PATCH] lsm: handle the NULL buffer case in lsm_fill_user_ctx()
Date: Fri, 15 Mar 2024 12:19:05 -0400 [thread overview]
Message-ID: <CAHC9VhS245LRsa3DhdkZ-u3+qvroygsyBm2q5mZWkOW8eOKOdQ@mail.gmail.com> (raw)
In-Reply-To: <20240315161345.GA309097@mail.hallyn.com>
On Fri, Mar 15, 2024 at 12:13 PM Serge E. Hallyn <serge@hallyn.com> wrote:
> On Fri, Mar 15, 2024 at 09:08:47AM -0700, Casey Schaufler wrote:
> > On 3/15/2024 8:02 AM, Serge E. Hallyn wrote:
> > > On Wed, Mar 13, 2024 at 10:22:03PM -0400, Paul Moore wrote:
> > >> Passing a NULL buffer into the lsm_get_self_attr() syscall is a valid
> > >> way to quickly determine the minimum size of the buffer needed to for
> > >> the syscall to return all of the LSM attributes to the caller.
> > >> Unfortunately we/I broke that behavior in commit d7cf3412a9f6
> > >> ("lsm: consolidate buffer size handling into lsm_fill_user_ctx()")
> > >> such that it returned an error to the caller; this patch restores the
> > >> original desired behavior of using the NULL buffer as a quick way to
> > >> correctly size the attribute buffer.
> > >>
> > >> Cc: stable@vger.kernel.org
> > >> Fixes: d7cf3412a9f6 ("lsm: consolidate buffer size handling into lsm_fill_user_ctx()")
> > >> Signed-off-by: Paul Moore <paul@paul-moore.com>
> > >> ---
> > >> security/security.c | 8 +++++++-
> > >> 1 file changed, 7 insertions(+), 1 deletion(-)
> > >>
> > >> diff --git a/security/security.c b/security/security.c
> > >> index 5b2e0a15377d..7e118858b545 100644
> > >> --- a/security/security.c
> > >> +++ b/security/security.c
> > >> @@ -780,7 +780,9 @@ static int lsm_superblock_alloc(struct super_block *sb)
> > >> * @id: LSM id
> > >> * @flags: LSM defined flags
> > >> *
> > >> - * Fill all of the fields in a userspace lsm_ctx structure.
> > >> + * Fill all of the fields in a userspace lsm_ctx structure. If @uctx is NULL
> > >> + * simply calculate the required size to output via @utc_len and return
> > >> + * success.
> > >> *
> > >> * Returns 0 on success, -E2BIG if userspace buffer is not large enough,
> > >> * -EFAULT on a copyout error, -ENOMEM if memory can't be allocated.
> > >> @@ -799,6 +801,10 @@ int lsm_fill_user_ctx(struct lsm_ctx __user *uctx, u32 *uctx_len,
> > >> goto out;
> > >> }
> > >>
> > >> + /* no buffer - return success/0 and set @uctx_len to the req size */
> > >> + if (!uctx)
> > >> + goto out;
> > > If the user just passes in *uctx_len=0, then they will get -E2BIG
> > > but still will get the length in *uctx_len.
> >
> > Yes.
> >
> > > To use it this new way, they have to first set *uctx_len to a
> > > value larger than nctx_len could possibly be, else they'll...
> > > still get -E2BIG.
> >
> > Not sure I understand the problem. A return of 0 or E2BIG gets the
> > caller the size.
>
> The problem is that there are two ways of doing the same thing, with
> different behavior. People are bound to get it wrong at some point,
> and it's more corner cases to try and maintain (once we start).
I have a different perspective on this, you can supply either a NULL
buffer and/or a buffer that is too small, including a size of zero,
and you'll get back an -E2BIG and a minimum buffer size. What's the
old wisdom, be conservative in what you send and liberal in what you
accept?
--
paul-moore.com
next prev parent reply other threads:[~2024-03-15 16:19 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-03-14 2:22 [PATCH] lsm: handle the NULL buffer case in lsm_fill_user_ctx() Paul Moore
2024-03-14 15:49 ` Paul Moore
2024-03-15 15:02 ` Serge E. Hallyn
2024-03-15 15:18 ` Paul Moore
2024-03-15 15:55 ` Serge E. Hallyn
2024-03-15 16:00 ` Paul Moore
2024-03-15 16:18 ` Casey Schaufler
2024-03-15 16:08 ` Casey Schaufler
2024-03-15 16:13 ` Serge E. Hallyn
2024-03-15 16:19 ` Paul Moore [this message]
2024-03-15 16:28 ` Serge E. Hallyn
2024-03-15 16:42 ` Paul Moore
2024-03-15 17:00 ` Serge E. Hallyn
2024-03-15 19:32 ` Paul Moore
2024-03-15 19:40 ` Serge E. Hallyn
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAHC9VhS245LRsa3DhdkZ-u3+qvroygsyBm2q5mZWkOW8eOKOdQ@mail.gmail.com \
--to=paul@paul-moore.com \
--cc=casey@schaufler-ca.com \
--cc=linux-security-module@vger.kernel.org \
--cc=serge@hallyn.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).