Check security/commoncap.c:get_vfs_caps_from_disk() Quoting Peter Dolding (oiaohm@xxxxxxxxx): > Containers as used in docker give some application portability. > > There is a universal headache in the room. Dynamic ELF binaries > have a build into binary interpreter string. Bad part is the dynamic > binary interpreter is part of the libc so you must have the right libc > and interpreter together or bad things can happen. > > Ok patchelf is a option but its not a good one when you wake up that > you can no longer checksum your binary. So you cannot do signed > binaries. > > So the problem comes how to create a solution that will work and will > not cause a security mess. What has come my mind is extended file > attributes(xattr) exist lets not make use of them. > > I can get so far to creating a patch to fix this issue then I run into > a road block. > > Yes I can find where the interpreter is read from the executable simple enough > In 2.16 Linux > fs/binfmt_elf.c line 655 as elf_interpreter > and > fs/binfmt_elf_fdpic.c line 216 as interpreter_name > > Problem is I cannot find the other half I want. How to lookup a > xattr in kernel space on the elf binary so allowing the interpreter to > be assigned from a xattr value if no xattr value do exactly what it > use to. A small static binary for installers can set xattr option no > issues. Its so annoying to be so close but so far from being able to > make a proto patch any clues about xattr look up. > > This removes script wrapping and allows use of compatibility options. > > Now if we can make this work. This will allow kernel tools including > the ones to control containers to ship as distribution independent > binaries with bundled libc. > > I can see debugging advantages. Remember you cannot mix particular > licenses into a single binary either. Yes that they can dynamic link > does not mean you can legally make a static binary of them. > > If I can workout how to make kernel loader to xattr value the next > will be make ld-linux.so accept xattr options. Like the orgin > problem with RPATH and LD_PRELOAD issue on Suid bit binaries heck > these days there are a lot of dbus using binaries where environmental > overrides of interpreter should fail since they are not directly > connected to the file. > > Please pardon me posting this here. I could not find a mailing list > that directly relates to messing with the loaders. > > Peter Dolding > _______________________________________________ > Containers mailing list > Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx > https://lists.linuxfoundation.org/mailman/listinfo/containers _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers