[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <20090724224223.GH4231@webber.adilger.int>
Date: Fri, 24 Jul 2009 16:42:23 -0600
From: Andreas Dilger <adilger@....com>
To: Eric Paris <eparis@...hat.com>
Cc: linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
malware-list@...sg.printk.net, Valdis.Kletnieks@...edu,
greg@...ah.com, jcm@...hat.com, douglas.leeder@...hos.com,
tytso@....edu, arjan@...radead.org, david@...g.hm,
jengelh@...ozas.de, aviro@...hat.com, mrkafk@...il.com,
alexl@...hat.com, jack@...e.cz, tvrtko.ursulin@...hos.com,
a.p.zijlstra@...llo.nl, hch@...radead.org,
alan@...rguk.ukuu.org.uk, mmorley@....in, pavel@...e.cz
Subject: Re: fanotify - overall design before I start sending patches
On Jul 24, 2009 17:21 -0400, Eric Paris wrote:
> On Fri, 2009-07-24 at 15:00 -0600, Andreas Dilger wrote:
> > On Jul 24, 2009 16:13 -0400, Eric Paris wrote:
> > It seems like a 32-bit mask might not be enough, it wouldn't be hard
> > at this stage to add a 64-bit mask. Lustre has a similar mechanism
> > (changelog) that allows tracking all different kinds of filesystem
> > events (create/unlink/symlink/link/rename/mkdir/setxattr/etc), instead
> > of just open/close, also use by HSM, enhanced rsync, etc.
>
> I had a 64 bit mask, but Al Viro ask me to go back to a 32 bit mask
> because of i386 register pressure. The bitmask operations are on VERY
> hot paths inside the kernel.
How about adding a spare "__u32 mask_hi" for future use, so that it can
be changed directly into a __u64 on LE machines? That preserves the
extensibility for the future, without hitting performance on 32-bit
machines before it is needed.
> > > struct fanotify_event_metadata {
> > > __u32 event_len;
> > > __s32 fd;
> > > __u32 mask;
> > > __u32 f_flags;
> > > __s32 pid;
> > > __s32 tgid;
> > > __u64 cookie;
> > > } __attribute__((packed));
> >
> > Getting the attributes that have changed into this message is also
> > useful, as it avoids a continual stream of "stat" calls on the inodes.
>
> Hmmm, I'll take a look. Do you have a good example of what you would
> want to see? I don't think we know in the notification hooks what
> actually is being changed :(
Well, I'm thinking there will be a lot of events that some applications
will not care about (e.g. PERM checks where the user is only changing
the file mode, vs. PERM checks where the owner of the file is changing).
Even if the old attributes are not available, having a mask of which
fields in the inode changed, and struct stat64 would be very useful.
> > The other thing that is important for HSM is that this log is atomic
> > and persistent, otherwise there may be files that are missed if the
> > node crashes. This involves creating atomic update records as part
> > of the filesystem operation, and then userspace consumes them and
> > tells the kernel that it is finished with records up to X. Otherwise
> > you risk inconsistencies between rsync/HSM/updatedb for files that
> > are updated just before a crash.
>
> Uhhh, persistent across a crash? Nope, don't have that. Notification
> is all in memory. Can't I just put the onus on userspace to recheck
> things maybe? Sounds like a user for i_version....
Well, if new files are created then userspace won't have any idea which
inodes need to be checked, and it will also need to keep a persistent
database of all file i_version values. If you are trying to hook a
backup tool onto such an interface and files created persistently on
disk before a crash are not handled, then they may never be backed up.
Tools like inotify are fine for desktop window refresh and similar uses,
but for applications which require robust handling they also need to
work over a crash.
The other issue is that you might get quite a large queue of operations
in memory, and if this can't be saved to the filesystem then it might
result in OOMing itself.
> > > If a FAN_ACCESS_PERM or FAN_OPEN_PERM event is received the listener
> > > must send a response before the 5 second timeout. If no response is
> > > sent before the 5 second timeout the original operation is allowed. If
> > > this happens too many times (10 in a row) the fanotify group is evicted
> > > from the kernel and will not get any new events.
> >
> > This should be a tunable, since if the intent is to monitor PERM checks
> > it would be possible for users to DOS the machine and delay the userspace
> > programs and access files they shouldn't be able to.
>
> At the moment I cheat and say root only to bind. I do plan to open it
> up to non-root users after it's in and working, but I'm seriously
> considering leaving _PERM events as root only. It's hard to map the
> original to listener security implications. So making sure the listener
> is always root is easy :)
My comment has nothing to do with non-root access. It has to do with
how long the userspace watcher has to handle an event. If a regular user
is running a 50-thread iozone with a 1M file directory you can imagine it
will create a lot of events to watch, along with a lot of seeking to slow
down the processing of events. If the user then does "open(secretfile)"
(where your _PERM check is doing something useful) it is possible
that the userspace listener will time out and miss some events.
> Userspace would never be able to access a file it shouldn't be allowed
> to (the new fd is created in the context of the listener and EPERM is
> possible.)
Ah, so the _PERM check is only intended to grant extra access, instead
of restricting it? That should be made clear in the documentation that
doing the opposite is an easily-bypassed security vulnerability.
Cheers, Andreas
--
Andreas Dilger
Sr. Staff Engineer, Lustre Group
Sun Microsystems of Canada, Inc.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists