From: ebiederm@xmission.com (Eric W. Biederman) To: Paul Moore <paul@paul-moore.com> Cc: Richard Guy Briggs <rgb@redhat.com>, nhorman@tuxdriver.com, linux-api@vger.kernel.org, containers@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, dhowells@redhat.com, linux-audit@redhat.com, netfilter-devel@vger.kernel.org, simo@redhat.com, netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, Eric Paris <eparis@parisplace.org>, mpatel@redhat.com, Serge Hallyn <serge@hallyn.com> Subject: Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon Date: Fri, 17 Apr 2020 17:23:08 -0500 [thread overview] Message-ID: <871rol7nw3.fsf@x220.int.ebiederm.org> (raw) In-Reply-To: <CAHC9VhR3gbmj5+5MY-whLtStKqDEHgvMRigU9hW0X1kpxF91ag@mail.gmail.com> (Paul Moore's message of "Thu, 16 Apr 2020 17:53:23 -0400") Paul Moore <paul@paul-moore.com> writes: > On Thu, Apr 16, 2020 at 4:36 PM Eric W. Biederman <ebiederm@xmission.com> wrote: >> Paul Moore <paul@paul-moore.com> writes: >> > On Mon, Mar 30, 2020 at 1:49 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> On 2020-03-30 13:34, Paul Moore wrote: >> >> > On Mon, Mar 30, 2020 at 12:22 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > On 2020-03-30 10:26, Paul Moore wrote: >> >> > > > On Mon, Mar 30, 2020 at 9:47 AM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > On 2020-03-28 23:11, Paul Moore wrote: >> >> > > > > > On Tue, Mar 24, 2020 at 5:02 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > > > On 2020-03-23 20:16, Paul Moore wrote: >> >> > > > > > > > On Thu, Mar 19, 2020 at 6:03 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > > > > > On 2020-03-18 18:06, Paul Moore wrote: >> > >> > ... >> > >> >> > > Well, every time a record gets generated, *any* record gets generated, >> >> > > we'll need to check for which audit daemons this record is in scope and >> >> > > generate a different one for each depending on the content and whether >> >> > > or not the content is influenced by the scope. >> >> > >> >> > That's the problem right there - we don't want to have to generate a >> >> > unique record for *each* auditd on *every* record. That is a recipe >> >> > for disaster. >> >> > >> >> > Solving this for all of the known audit records is not something we >> >> > need to worry about in depth at the moment (although giving it some >> >> > casual thought is not a bad thing), but solving this for the audit >> >> > container ID information *is* something we need to worry about right >> >> > now. >> >> >> >> If you think that a different nested contid value string per daemon is >> >> not acceptable, then we are back to issuing a record that has only *one* >> >> contid listed without any nesting information. This brings us back to >> >> the original problem of keeping *all* audit log history since the boot >> >> of the machine to be able to track the nesting of any particular contid. >> > >> > I'm not ruling anything out, except for the "let's just completely >> > regenerate every record for each auditd instance". >> >> Paul I am a bit confused about what you are referring to when you say >> regenerate every record. >> >> Are you saying that you don't want to repeat the sequence: >> audit_log_start(...); >> audit_log_format(...); >> audit_log_end(...); >> for every nested audit daemon? > > If it can be avoided yes. Audit performance is already not-awesome, > this would make it even worse. As far as I can see not repeating sequences like that is fundamental for making this work at all. Just because only the audit subsystem should know about one or multiple audit daemons. Nothing else should care. >> Or are you saying that you would like to literraly want to send the same >> skb to each of the nested audit daemons? > > Ideally we would reuse the generated audit messages as much as > possible. Less work is better. That's really my main concern here, > let's make sure we aren't going to totally tank performance when we > have a bunch of nested audit daemons. So I think there are two parts of this answer. Assuming we are talking about nesting audit daemons in containers we will have different rulesets and I expect most of the events for a nested audit daemon won't be of interest to the outer audit daemon. Beyond that it should be very straight forward to keep a pointer and leave the buffer as a scatter gather list until audit_log_end and translate pids, and rewrite ACIDs attributes in audit_log_end when we build the final packet. Either through collaboration with audit_log_format or a special audit_log command that carefully sets up the handful of things that need that information. Hmm. I am seeing that we send skbs to kauditd and then kauditd sends those skbs to userspace. I presume that is primary so that sending messages to userspace does not block the process being audited. Plus a little bit so that the retry logic will work. I think the naive implementation would be to simply have 1 kauditd per auditd (strictly and audit context/namespace). Although that can be optimized if that is a problem. Beyond that I think we would need to look at profiles to really understand where the bottlenecks are. >> Or are you thinking of something else? > > As mentioned above, I'm not thinking of anything specific, other than > let's please not have to regenerate *all* of the audit record strings > for each instance of an audit daemon, that's going to be a killer. > > Maybe we have to regenerate some, if we do, what would that look like > in code? How do we handle the regeneration aspect? I worry that is > going to be really ugly. > > Maybe we finally burn down the audit_log_format(...) function and pass > structs/TLVs to the audit subsystem and the audit subsystem generates > the strings in the auditd connection thread. Some of the record > strings could likely be shared, others would need to be ACID/auditd > dependent. I think we just a very limited amount of structs/TLVs for the cases that matter and one-one auditd and kauditd implementations we should still be able to do everything in audit_log_end. Plus doing as much work as possible in audit_log_end where things are still cache hot is desirable. > I'm open to any ideas people may have. We have a problem, let's solve > it. It definitely makes sense to look ahead to having audit daemons running in containers, but in the grand scheme of things that is a nice to have. Probably something we will and should get to, but we have lived a long time without auditd running in containers so I expect we can live a while longer. As I understand Richard patchset for the specific case of the ACID we are only talking about taking a subset of an existing string, and one string at that. Not hard at all. Especially when looking at the fundamental fact that we will need to send a different skb to userspace, for each audit daemon. Eric
WARNING: multiple messages have this Message-ID (diff)
From: ebiederm@xmission.com (Eric W. Biederman) To: Paul Moore <paul@paul-moore.com> Cc: nhorman@tuxdriver.com, Richard Guy Briggs <rgb@redhat.com>, linux-api@vger.kernel.org, containers@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, dhowells@redhat.com, linux-audit@redhat.com, netfilter-devel@vger.kernel.org, simo@redhat.com, netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, Eric Paris <eparis@parisplace.org>, mpatel@redhat.com, Serge Hallyn <serge@hallyn.com> Subject: Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon Date: Fri, 17 Apr 2020 17:23:08 -0500 [thread overview] Message-ID: <871rol7nw3.fsf@x220.int.ebiederm.org> (raw) In-Reply-To: <CAHC9VhR3gbmj5+5MY-whLtStKqDEHgvMRigU9hW0X1kpxF91ag@mail.gmail.com> (Paul Moore's message of "Thu, 16 Apr 2020 17:53:23 -0400") Paul Moore <paul@paul-moore.com> writes: > On Thu, Apr 16, 2020 at 4:36 PM Eric W. Biederman <ebiederm@xmission.com> wrote: >> Paul Moore <paul@paul-moore.com> writes: >> > On Mon, Mar 30, 2020 at 1:49 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> On 2020-03-30 13:34, Paul Moore wrote: >> >> > On Mon, Mar 30, 2020 at 12:22 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > On 2020-03-30 10:26, Paul Moore wrote: >> >> > > > On Mon, Mar 30, 2020 at 9:47 AM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > On 2020-03-28 23:11, Paul Moore wrote: >> >> > > > > > On Tue, Mar 24, 2020 at 5:02 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > > > On 2020-03-23 20:16, Paul Moore wrote: >> >> > > > > > > > On Thu, Mar 19, 2020 at 6:03 PM Richard Guy Briggs <rgb@redhat.com> wrote: >> >> > > > > > > > > On 2020-03-18 18:06, Paul Moore wrote: >> > >> > ... >> > >> >> > > Well, every time a record gets generated, *any* record gets generated, >> >> > > we'll need to check for which audit daemons this record is in scope and >> >> > > generate a different one for each depending on the content and whether >> >> > > or not the content is influenced by the scope. >> >> > >> >> > That's the problem right there - we don't want to have to generate a >> >> > unique record for *each* auditd on *every* record. That is a recipe >> >> > for disaster. >> >> > >> >> > Solving this for all of the known audit records is not something we >> >> > need to worry about in depth at the moment (although giving it some >> >> > casual thought is not a bad thing), but solving this for the audit >> >> > container ID information *is* something we need to worry about right >> >> > now. >> >> >> >> If you think that a different nested contid value string per daemon is >> >> not acceptable, then we are back to issuing a record that has only *one* >> >> contid listed without any nesting information. This brings us back to >> >> the original problem of keeping *all* audit log history since the boot >> >> of the machine to be able to track the nesting of any particular contid. >> > >> > I'm not ruling anything out, except for the "let's just completely >> > regenerate every record for each auditd instance". >> >> Paul I am a bit confused about what you are referring to when you say >> regenerate every record. >> >> Are you saying that you don't want to repeat the sequence: >> audit_log_start(...); >> audit_log_format(...); >> audit_log_end(...); >> for every nested audit daemon? > > If it can be avoided yes. Audit performance is already not-awesome, > this would make it even worse. As far as I can see not repeating sequences like that is fundamental for making this work at all. Just because only the audit subsystem should know about one or multiple audit daemons. Nothing else should care. >> Or are you saying that you would like to literraly want to send the same >> skb to each of the nested audit daemons? > > Ideally we would reuse the generated audit messages as much as > possible. Less work is better. That's really my main concern here, > let's make sure we aren't going to totally tank performance when we > have a bunch of nested audit daemons. So I think there are two parts of this answer. Assuming we are talking about nesting audit daemons in containers we will have different rulesets and I expect most of the events for a nested audit daemon won't be of interest to the outer audit daemon. Beyond that it should be very straight forward to keep a pointer and leave the buffer as a scatter gather list until audit_log_end and translate pids, and rewrite ACIDs attributes in audit_log_end when we build the final packet. Either through collaboration with audit_log_format or a special audit_log command that carefully sets up the handful of things that need that information. Hmm. I am seeing that we send skbs to kauditd and then kauditd sends those skbs to userspace. I presume that is primary so that sending messages to userspace does not block the process being audited. Plus a little bit so that the retry logic will work. I think the naive implementation would be to simply have 1 kauditd per auditd (strictly and audit context/namespace). Although that can be optimized if that is a problem. Beyond that I think we would need to look at profiles to really understand where the bottlenecks are. >> Or are you thinking of something else? > > As mentioned above, I'm not thinking of anything specific, other than > let's please not have to regenerate *all* of the audit record strings > for each instance of an audit daemon, that's going to be a killer. > > Maybe we have to regenerate some, if we do, what would that look like > in code? How do we handle the regeneration aspect? I worry that is > going to be really ugly. > > Maybe we finally burn down the audit_log_format(...) function and pass > structs/TLVs to the audit subsystem and the audit subsystem generates > the strings in the auditd connection thread. Some of the record > strings could likely be shared, others would need to be ACID/auditd > dependent. I think we just a very limited amount of structs/TLVs for the cases that matter and one-one auditd and kauditd implementations we should still be able to do everything in audit_log_end. Plus doing as much work as possible in audit_log_end where things are still cache hot is desirable. > I'm open to any ideas people may have. We have a problem, let's solve > it. It definitely makes sense to look ahead to having audit daemons running in containers, but in the grand scheme of things that is a nice to have. Probably something we will and should get to, but we have lived a long time without auditd running in containers so I expect we can live a while longer. As I understand Richard patchset for the specific case of the ACID we are only talking about taking a subset of an existing string, and one string at that. Not hard at all. Especially when looking at the fundamental fact that we will need to send a different skb to userspace, for each audit daemon. Eric -- Linux-audit mailing list Linux-audit@redhat.com https://www.redhat.com/mailman/listinfo/linux-audit
next prev parent reply other threads:[~2020-04-17 22:26 UTC|newest] Thread overview: 168+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-12-31 19:48 [PATCH ghak90 V8 00/16] audit: implement container identifier Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 01/16] audit: collect audit task parameters Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 02/16] audit: add container id Richard Guy Briggs 2020-01-22 21:28 ` Paul Moore 2020-01-22 21:28 ` Paul Moore 2020-01-30 17:53 ` Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 03/16] audit: read container ID of a process Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 04/16] audit: convert to contid list to check for orch/engine ownership Richard Guy Briggs 2020-01-22 21:28 ` Paul Moore 2020-01-22 21:28 ` Paul Moore 2020-02-04 22:51 ` Richard Guy Briggs 2020-02-04 22:51 ` Richard Guy Briggs 2020-02-05 22:40 ` Paul Moore 2020-02-05 22:40 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 05/16] audit: log drop of contid on exit of last task Richard Guy Briggs 2020-01-22 21:28 ` Paul Moore 2020-02-04 23:02 ` Richard Guy Briggs 2020-02-04 23:02 ` Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 06/16] audit: log container info of syscalls Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon Richard Guy Briggs 2020-01-22 21:28 ` Paul Moore 2020-01-22 21:28 ` Paul Moore 2020-01-23 16:29 ` Richard Guy Briggs 2020-01-23 17:09 ` Paul Moore 2020-01-23 20:04 ` Richard Guy Briggs 2020-01-23 21:35 ` Paul Moore 2020-02-04 23:14 ` Richard Guy Briggs 2020-02-05 22:50 ` Paul Moore 2020-02-05 22:50 ` Paul Moore 2020-02-12 22:38 ` Steve Grubb 2020-02-13 0:09 ` Paul Moore 2020-02-13 21:44 ` Paul Moore 2020-03-12 19:30 ` Richard Guy Briggs 2020-03-12 19:30 ` Richard Guy Briggs 2020-03-13 16:29 ` Paul Moore 2020-03-13 16:29 ` Paul Moore 2020-03-13 18:59 ` Richard Guy Briggs 2020-03-13 18:59 ` Richard Guy Briggs 2020-03-18 20:56 ` Paul Moore 2020-03-18 20:56 ` Paul Moore 2020-03-18 21:26 ` Richard Guy Briggs 2020-03-18 21:26 ` Richard Guy Briggs 2020-03-18 21:42 ` Paul Moore 2020-03-18 21:42 ` Paul Moore 2020-03-18 21:55 ` Richard Guy Briggs 2020-03-18 21:55 ` Richard Guy Briggs 2020-03-18 22:06 ` Paul Moore 2020-03-18 22:06 ` Paul Moore 2020-03-19 22:02 ` Richard Guy Briggs 2020-03-19 22:02 ` Richard Guy Briggs 2020-03-24 0:16 ` Paul Moore 2020-03-24 0:16 ` Paul Moore 2020-03-24 21:01 ` Richard Guy Briggs 2020-03-24 21:01 ` Richard Guy Briggs 2020-03-29 3:11 ` Paul Moore 2020-03-29 3:11 ` Paul Moore 2020-03-30 13:47 ` Richard Guy Briggs 2020-03-30 13:47 ` Richard Guy Briggs 2020-03-30 14:26 ` Paul Moore 2020-03-30 14:26 ` Paul Moore 2020-03-30 16:21 ` Richard Guy Briggs 2020-03-30 16:21 ` Richard Guy Briggs 2020-03-30 17:34 ` Paul Moore 2020-03-30 17:34 ` Paul Moore 2020-03-30 17:49 ` Richard Guy Briggs 2020-03-30 17:49 ` Richard Guy Briggs 2020-03-30 19:55 ` Paul Moore 2020-03-30 19:55 ` Paul Moore 2020-04-16 20:33 ` Eric W. Biederman 2020-04-16 20:33 ` Eric W. Biederman 2020-04-16 21:53 ` Paul Moore 2020-04-16 21:53 ` Paul Moore 2020-04-17 22:23 ` Eric W. Biederman [this message] 2020-04-17 22:23 ` Eric W. Biederman 2020-04-22 17:24 ` Paul Moore 2020-04-22 17:24 ` Paul Moore 2020-06-08 18:03 ` Richard Guy Briggs 2020-06-08 18:03 ` Richard Guy Briggs 2020-06-17 21:33 ` Paul Moore 2020-06-17 21:33 ` Paul Moore 2020-06-19 15:22 ` Richard Guy Briggs 2020-06-19 15:22 ` Richard Guy Briggs 2020-03-12 20:27 ` Richard Guy Briggs 2020-03-12 20:27 ` Richard Guy Briggs 2020-03-13 16:42 ` Paul Moore 2020-03-13 16:42 ` Paul Moore 2020-03-13 16:45 ` Steve Grubb 2020-03-13 16:45 ` Steve Grubb 2020-03-13 16:49 ` Paul Moore 2020-03-13 16:49 ` Paul Moore 2020-03-13 19:23 ` Richard Guy Briggs 2020-03-13 19:23 ` Richard Guy Briggs 2020-03-18 21:01 ` Paul Moore 2020-03-18 21:01 ` Paul Moore 2020-03-18 21:41 ` Richard Guy Briggs 2020-03-18 21:41 ` Richard Guy Briggs 2020-03-18 21:47 ` Paul Moore 2020-03-18 21:47 ` Paul Moore 2020-03-19 21:47 ` Richard Guy Briggs 2020-03-19 21:47 ` Richard Guy Briggs 2020-03-20 21:56 ` Paul Moore 2020-03-20 21:56 ` Paul Moore 2020-03-25 12:29 ` Richard Guy Briggs 2020-03-25 12:29 ` Richard Guy Briggs 2020-03-29 3:17 ` Paul Moore 2020-03-29 3:17 ` Paul Moore 2020-03-30 15:23 ` Richard Guy Briggs 2020-03-30 15:23 ` Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 08/16] audit: add support for non-syscall auxiliary records Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 09/16] audit: add containerid support for user records Richard Guy Briggs 2019-12-31 19:48 ` Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 10/16] audit: add containerid filtering Richard Guy Briggs 2019-12-31 19:48 ` Richard Guy Briggs 2019-12-31 19:48 ` [PATCH ghak90 V8 11/16] audit: add support for containerid to network namespaces Richard Guy Briggs 2019-12-31 19:48 ` Richard Guy Briggs 2020-01-22 21:28 ` Paul Moore 2020-01-22 21:28 ` Paul Moore 2020-02-04 23:42 ` Richard Guy Briggs 2020-02-05 22:51 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 12/16] audit: contid check descendancy and nesting Richard Guy Briggs 2019-12-31 19:48 ` Richard Guy Briggs 2020-01-22 21:29 ` Paul Moore 2020-01-22 21:29 ` Paul Moore 2020-01-23 21:02 ` Richard Guy Briggs 2020-01-23 21:47 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 13/16] audit: track container nesting Richard Guy Briggs 2019-12-31 19:48 ` Richard Guy Briggs 2020-01-22 21:29 ` Paul Moore 2020-01-22 21:29 ` Paul Moore 2020-01-30 19:27 ` Richard Guy Briggs 2020-02-05 23:05 ` Paul Moore 2020-02-05 23:50 ` Richard Guy Briggs 2020-02-13 21:49 ` Paul Moore 2020-03-12 20:51 ` Richard Guy Briggs 2020-03-12 20:51 ` Richard Guy Briggs 2020-03-13 16:47 ` Paul Moore 2020-03-13 16:47 ` Paul Moore 2020-03-14 22:42 ` Richard Guy Briggs 2020-03-14 22:42 ` Richard Guy Briggs 2020-03-17 18:28 ` Richard Guy Briggs 2020-03-17 18:28 ` Richard Guy Briggs 2020-03-18 21:08 ` Paul Moore 2020-03-18 21:08 ` Paul Moore 2020-01-31 14:50 ` Steve Grubb 2020-02-04 13:19 ` Richard Guy Briggs 2020-02-04 15:47 ` Steve Grubb 2020-02-04 15:47 ` Steve Grubb 2020-02-04 15:52 ` Paul Moore 2020-02-04 15:52 ` Paul Moore 2020-02-04 18:12 ` Steve Grubb 2020-02-05 22:57 ` Paul Moore 2020-02-05 22:57 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 14/16] audit: check contid depth and add limit config param Richard Guy Briggs 2020-01-22 21:29 ` Paul Moore 2020-01-22 21:29 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 15/16] audit: check contid count per netns and add config param limit Richard Guy Briggs 2020-01-22 21:29 ` Paul Moore 2020-01-22 21:29 ` Paul Moore 2019-12-31 19:48 ` [PATCH ghak90 V8 16/16] audit: add capcontid to set contid outside init_user_ns Richard Guy Briggs 2020-01-22 21:29 ` Paul Moore 2020-01-22 21:29 ` Paul Moore 2020-02-05 0:39 ` Richard Guy Briggs 2020-02-05 22:56 ` Paul Moore 2020-02-06 12:51 ` Richard Guy Briggs 2020-02-13 21:58 ` Paul Moore 2020-02-13 21:58 ` Paul Moore 2020-03-12 21:58 ` Richard Guy Briggs 2020-03-12 21:58 ` Richard Guy Briggs
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=871rol7nw3.fsf@x220.int.ebiederm.org \ --to=ebiederm@xmission.com \ --cc=containers@lists.linux-foundation.org \ --cc=dhowells@redhat.com \ --cc=eparis@parisplace.org \ --cc=linux-api@vger.kernel.org \ --cc=linux-audit@redhat.com \ --cc=linux-fsdevel@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=mpatel@redhat.com \ --cc=netdev@vger.kernel.org \ --cc=netfilter-devel@vger.kernel.org \ --cc=nhorman@tuxdriver.com \ --cc=paul@paul-moore.com \ --cc=rgb@redhat.com \ --cc=serge@hallyn.com \ --cc=simo@redhat.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.