Re: Interaction user namespace, /proc/1 ownership & cap_set

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 02.07.2013 11:25, schrieb Daniel P. Berrange:
> On Tue, Jul 02, 2013 at 10:56:37AM +0200, Richard Weinberger wrote:
>> Am 02.07.2013 10:44, schrieb Eric W. Biederman:
>>> Gao feng <gaofeng@xxxxxxxxxxxxxx> writes:
>>>
>>>> On 07/02/2013 12:16 AM, Daniel P. Berrange wrote:
>>>>> I'm struggling debugging a strange problem with interaction between user
>>>>> namespaces, cap_set and ownership of files in /proc/1/
>>>>>
>>>>
>>>> This problem is occured after we call setuid/gid.
>>>>
>>>> for example, a task whose pid is 1234 calls
>>>> setregid(10,10);
>>>> setreuid(10,10);
> 
> If seems to get reset to the right values (0:0) when we execve()
> the init binary though.  This doesn't happen if we have invoked
> the capset() syscall in between the setregid & the execve() calls.
> 
>>>>
>>>>
>>>> The uid/gid of the /proc/1234 is 10:0
>>>> ll /proc/1234 -d
>>>> dr-xr-xr-x 8 uucp wheel 0 Jul  2 10:57 /proc/1234
>>>>
>>>> the uid/gid of the files under /proc/1234 are two kinds...
>>>> ll /proc/1234
>>>> dr-xr-xr-x 2 uucp wheel 0 Jul  2 10:58 attr
>>>> -rw-r--r-- 1 root root 0 Jul  2 10:58 autogroup
>>>> ...
>>>> dr-xr-xr-x 5 uucp wheel 0 Jul  2 10:58 net
>>>> dr-x--x--x 2 root root 0 Jul  2 10:58 ns
>>>> ...
>>>> dr-xr-xr-x 3 uucp wheel 0 Jul  2 10:58 task
>>>>
>>>> I checked the pre_revalidate and found the owner of the files under /proc/<pid>
>>>> will be set to the GLOBAL_ROOT_UID if the task executed setuid/setgid(task_dumpable is false).
>>>> Is this what we expected? why? 
>>>
>>> Expected yes.  Perfect perhaps not.
>>>
>>> That piece of code has not been examined to see if it is safe to use
>>> make_kuid(task_user_ns(task), 0), instead of GLOBAL_ROOT_UID.
>>>
>>>> For user namespace,the owner of /proc/1/* is incorrect and
>>>> after task call setuid/gid in user namespace, the owner of /proc/<pid-of-this-task>/* is incorrect
>>>> too.
>>>
>>> From the current semantics of dumpable GLOBAL_ROOT_UID is correct.
>>>
>>> Please double check but I believe /proc/self should continue to work,
>>> despite this.
>>
>> /proc/self is not an option. systemd (in particular some of it's tools with pid != 1) read from /proc/1/environ to find out
>> what environment variables it got to detect LXC and other visualization environments.
>> With userns enabled this check fails and systemd goes nuts because it thinks that it lives on top of a "real" Linux.
> 
> I don't even see how /proc/self would solve this, since it
> is just a symlink pointing to /proc/1 in this scenario, so
> the ownership of files at /proc/1/XXXX would still be wrong.

Yep.

> This isn't really a systemd specific problem either, I think
> any app would expect to be able to read its own files under
> /proc/$PID/

True. I was not blaming systemd.
In my case systemd is just the program which suffers from the issue.

Thanks,
//richard
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/containers




[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux