* [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source
@ 2006-03-08 16:33 Yi Yang
2006-03-08 16:53 ` Arjan van de Ven
0 siblings, 1 reply; 8+ messages in thread
From: Yi Yang @ 2006-03-08 16:33 UTC (permalink / raw)
To: LKML; +Cc: Andrew Morton
Current inotify implementation only focus on change of file system, but it doesn't
know who results in this change, this patch adds three fields to struct inotify_event,
tgid, uid and gid, they will save process ID, user ID and user group ID of the process
which leads to change in the file system, such software as anti-virus can make use
of this feature to monitor who is modifying a specific file.
Signed-off-by: Yi Yang <yang.y.yi@gmail.com>
--- a/include/linux/inotify.h.orig 2006-03-08 21:40:12.000000000 +0800
+++ b/include/linux/inotify.h 2006-03-08 23:51:54.000000000 +0800
@@ -19,6 +19,9 @@ struct inotify_event {
__s32 wd; /* watch descriptor */
__u32 mask; /* watch mask */
__u32 cookie; /* cookie to synchronize two events */
+ __u32 tgid; /* process ID of the event source */
+ __u32 uid; /* user ID of the responding process */
+ __u32 gid; /* group ID of the responding process */
__u32 len; /* length (including nulls) of name */
char name[0]; /* stub for possible name */
};
--- a/fs/inotify.c.orig 2006-03-08 20:58:31.000000000 +0800
+++ b/fs/inotify.c 2006-03-09 00:05:47.000000000 +0800
@@ -219,6 +219,9 @@ static struct inotify_kernel_event * ker
kevent->event.wd = wd;
kevent->event.mask = mask;
kevent->event.cookie = cookie;
+ kevent->event.tgid = current->tgid;
+ kevent->event.uid = current->uid;
+ kevent->event.gid = current->gid;
INIT_LIST_HEAD(&kevent->list);
^ permalink raw reply [flat|nested] 8+ messages in thread* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-08 16:33 [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source Yi Yang @ 2006-03-08 16:53 ` Arjan van de Ven 2006-03-09 5:18 ` Yi Yang 0 siblings, 1 reply; 8+ messages in thread From: Arjan van de Ven @ 2006-03-08 16:53 UTC (permalink / raw) To: Yi Yang; +Cc: LKML, Andrew Morton On Thu, 2006-03-09 at 00:33 +0800, Yi Yang wrote: > Current inotify implementation only focus on change of file system, but it doesn't > know who results in this change, this patch adds three fields to struct inotify_event, > tgid, uid and gid, they will save process ID, user ID and user group ID of the process > which leads to change in the file system, such software as anti-virus can make use > of this feature to monitor who is modifying a specific file. this patch appears to change the ABI! That is bad bad bad. Also, how can you guarantee that "current" is valid and meaningful at the place you use it to get the user id ?? Also the process ID part is really bogus, after all the process may have exited by the time the inotify client gets to it, and the PID may even already have been reused. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-08 16:53 ` Arjan van de Ven @ 2006-03-09 5:18 ` Yi Yang 2006-03-09 5:35 ` Arjan van de Ven 0 siblings, 1 reply; 8+ messages in thread From: Yi Yang @ 2006-03-09 5:18 UTC (permalink / raw) To: Arjan van de Ven; +Cc: LKML, Andrew Morton Arjan van de Ven wrote: > On Thu, 2006-03-09 at 00:33 +0800, Yi Yang wrote: > >> Current inotify implementation only focus on change of file system, but it doesn't >> know who results in this change, this patch adds three fields to struct inotify_event, >> tgid, uid and gid, they will save process ID, user ID and user group ID of the process >> which leads to change in the file system, such software as anti-virus can make use >> of this feature to monitor who is modifying a specific file. >> > > > this patch appears to change the ABI! That is bad bad bad. > a change of struct inotify_event can't change ABI, can you describe it more clear? > Also, how can you guarantee that "current" is valid and meaningful at > the place you use it to get the user id ?? > Of course, current process/thread never disappears before fsnotify_* returns. > Also the process ID part is really bogus, after all the process may have > exited by the time the inotify client gets to it, and the PID may even > already have been reused. > > Your concern is correct, but uid and git can give out some hints, I ever considered to save the name of current process, however that needs a bigger and length-variable inotify_event struct, moreover, to get the full path name of current process/thread in kernel will have a big overhead, so I must select a comprise way. In fact, the case you said is very few. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-09 5:18 ` Yi Yang @ 2006-03-09 5:35 ` Arjan van de Ven 2006-03-09 9:55 ` Yi Yang 0 siblings, 1 reply; 8+ messages in thread From: Arjan van de Ven @ 2006-03-09 5:35 UTC (permalink / raw) To: Yi Yang; +Cc: LKML, Andrew Morton On Thu, 2006-03-09 at 13:18 +0800, Yi Yang wrote: > Arjan van de Ven wrote: > > On Thu, 2006-03-09 at 00:33 +0800, Yi Yang wrote: > > > >> Current inotify implementation only focus on change of file system, but it doesn't > >> know who results in this change, this patch adds three fields to struct inotify_event, > >> tgid, uid and gid, they will save process ID, user ID and user group ID of the process > >> which leads to change in the file system, such software as anti-virus can make use > >> of this feature to monitor who is modifying a specific file. > >> > > > > > > this patch appears to change the ABI! That is bad bad bad. > > > a change of struct inotify_event can't change ABI, can you describe it > more clear? it breaks ABI because this structure is communicated to userspace, and you change both the layout and the size of it. What else would ABI mean?? > > Also, how can you guarantee that "current" is valid and meaningful at > > the place you use it to get the user id ?? > > > Of course, current process/thread never disappears before fsnotify_* > returns. but... what makes you think it's not a kernel thread such as kjournald? (which have basically meaningless current) > > Also the process ID part is really bogus, after all the process may have > > exited by the time the inotify client gets to it, and the PID may even > > already have been reused. > > > > > Your concern is correct, but uid and git can give out some hints, I ever > considered to > save the name of current process, however that needs a bigger and > length-variable > inotify_event struct, moreover, to get the full path name of current > process/thread > in kernel will have a big overhead, so I must select a comprise way. there is no "full path name" concept in linux like that. And even worse, many processes will not have *any* path because they have been deleted, especially the viruses will use this ;) ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-09 5:35 ` Arjan van de Ven @ 2006-03-09 9:55 ` Yi Yang 2006-03-09 19:35 ` Arjan van de Ven 0 siblings, 1 reply; 8+ messages in thread From: Yi Yang @ 2006-03-09 9:55 UTC (permalink / raw) To: Arjan van de Ven; +Cc: LKML, Andrew Morton Arjan van de Ven wrote: > On Thu, 2006-03-09 at 13:18 +0800, Yi Yang wrote: > >> Arjan van de Ven wrote: >> >>> On Thu, 2006-03-09 at 00:33 +0800, Yi Yang wrote: >>> >>> >>>> Current inotify implementation only focus on change of file system, but it doesn't >>>> know who results in this change, this patch adds three fields to struct inotify_event, >>>> tgid, uid and gid, they will save process ID, user ID and user group ID of the process >>>> which leads to change in the file system, such software as anti-virus can make use >>>> of this feature to monitor who is modifying a specific file. >>>> >>>> >>> this patch appears to change the ABI! That is bad bad bad. >>> >>> >> a change of struct inotify_event can't change ABI, can you describe it >> more clear? >> > > it breaks ABI because this structure is communicated to userspace, and > you change both the layout and the size of it. What else would ABI > mean?? > Many structures exported to user space in kernel are undergoing some change, A good application shouldn't count on invariability forever, My test application hasn't any problem before change and after change. > > >>> Also, how can you guarantee that "current" is valid and meaningful at >>> the place you use it to get the user id ?? >>> >>> >> Of course, current process/thread never disappears before fsnotify_* >> returns. >> > > but... what makes you think it's not a kernel thread such as kjournald? > (which have basically meaningless current) > you can get values of these fields without any problem for kernel thread although they are useless. > > >>> Also the process ID part is really bogus, after all the process may have >>> exited by the time the inotify client gets to it, and the PID may even >>> already have been reused. >>> >>> >>> >> Your concern is correct, but uid and git can give out some hints, I ever >> considered to >> save the name of current process, however that needs a bigger and >> length-variable >> inotify_event struct, moreover, to get the full path name of current >> process/thread >> in kernel will have a big overhead, so I must select a comprise way. >> > > there is no "full path name" concept in linux like that. And even worse, > many processes will not have *any* path because they have been deleted, > especially the viruses will use this ;) > For this case you said, this patch has now way really, do you have a good way to handle this case? > > > ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-09 9:55 ` Yi Yang @ 2006-03-09 19:35 ` Arjan van de Ven 2006-03-10 1:27 ` Yi Yang 0 siblings, 1 reply; 8+ messages in thread From: Arjan van de Ven @ 2006-03-09 19:35 UTC (permalink / raw) To: Yi Yang; +Cc: LKML, Andrew Morton > > > > it breaks ABI because this structure is communicated to userspace, and > > you change both the layout and the size of it. What else would ABI > > mean?? > > > Many structures exported to user space in kernel are undergoing some > change, A good application shouldn't count on invariability forever, > My test application hasn't any problem before change and after change. this is absolutely incorrect. This is an ABI that cannot change in any incompatible way. > > > > but... what makes you think it's not a kernel thread such as kjournald? > > (which have basically meaningless current) > > > you can get values of these fields without any problem for kernel > thread although they are useless. exactly > > > > there is no "full path name" concept in linux like that. And even worse, > > many processes will not have *any* path because they have been deleted, > > especially the viruses will use this ;) > > > For this case you said, this patch has now way really, do you have a > good way to handle this case? it sounds that what you want to achieve is broken in the first place... (or should use audit etc) ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-09 19:35 ` Arjan van de Ven @ 2006-03-10 1:27 ` Yi Yang 2006-03-10 7:39 ` Arjan van de Ven 0 siblings, 1 reply; 8+ messages in thread From: Yi Yang @ 2006-03-10 1:27 UTC (permalink / raw) To: Arjan van de Ven; +Cc: LKML, Andrew Morton Arjan van de Ven wrote: >>> it breaks ABI because this structure is communicated to userspace, and >>> you change both the layout and the size of it. What else would ABI >>> mean?? >>> >>> >> Many structures exported to user space in kernel are undergoing some >> change, A good application shouldn't count on invariability forever, >> My test application hasn't any problem before change and after change. >> > > > this is absolutely incorrect. This is an ABI that cannot change in any > incompatible way. > >>> but... what makes you think it's not a kernel thread such as kjournald? >>> (which have basically meaningless current) >>> >>> >> you can get values of these fields without any problem for kernel >> thread although they are useless. >> > > exactly > > >>> there is no "full path name" concept in linux like that. And even worse, >>> many processes will not have *any* path because they have been deleted, >>> especially the viruses will use this ;) >>> >>> >> For this case you said, this patch has now way really, do you have a >> good way to handle this case? >> > > it sounds that what you want to achieve is broken in the first place... > (or should use audit etc) > As I known, BSD process audit only can be done inside a process, and audit result is just visible after termination of this process, if an application wants to monitor all the processes, it has no way. My patch provides such a way bases on inotify with minimal work, it should be an good extension for inotify although it can't cover all the cases. > > ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source 2006-03-10 1:27 ` Yi Yang @ 2006-03-10 7:39 ` Arjan van de Ven 0 siblings, 0 replies; 8+ messages in thread From: Arjan van de Ven @ 2006-03-10 7:39 UTC (permalink / raw) To: Yi Yang; +Cc: LKML, Andrew Morton > >>> > >> For this case you said, this patch has now way really, do you have a > >> good way to handle this case? > >> > > > > it sounds that what you want to achieve is broken in the first place... > > (or should use audit etc) > > > As I known, BSD process audit only I'm not talking about BSD audit but about the CAPP security audit framework. ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2006-03-10 7:39 UTC | newest] Thread overview: 8+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2006-03-08 16:33 [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source Yi Yang 2006-03-08 16:53 ` Arjan van de Ven 2006-03-09 5:18 ` Yi Yang 2006-03-09 5:35 ` Arjan van de Ven 2006-03-09 9:55 ` Yi Yang 2006-03-09 19:35 ` Arjan van de Ven 2006-03-10 1:27 ` Yi Yang 2006-03-10 7:39 ` Arjan van de Ven
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox