Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5108789imm; Tue, 9 Oct 2018 09:47:56 -0700 (PDT) X-Google-Smtp-Source: ACcGV60Ms+ys90muuxMK7v68ilteag2gc0blohsM+CjrrE5U/FcLOz2BNiA730PIJSlYNQ9V44Yb X-Received: by 2002:a63:a119:: with SMTP id b25-v6mr26223273pgf.186.1539103676354; Tue, 09 Oct 2018 09:47:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539103676; cv=none; d=google.com; s=arc-20160816; b=YWsEH2M6o4zmFFlw0tJlYZXnE+QB7lT/PEZLYrns+Fx6bvQn9IGhiAUEAyV7E5fX90 nbxBu1TI2bniuwUssQAYcNBO7fOL5j7tJTMnc0OkDpqhsIej0Bl9khvG/5DWhK+cqLi3 XhpuJ/vVna8gDuGX6ekXBZwm05OmIKigKjmoRpDP5Qi8S7RBZuNLL3XJtYBA/n/JeazV KC62oXCp3keuMKjNnZpSJoN5RpWb5El8jXGCpU2v6JmvA/8J6twvOmuUY5mEkIACff/W JZx2/HLLisRVOzNJSyMlMKvplVeFaS7xnfGhB4inI8+GXaC82br+0fSGDWui3IV/nW1y Go6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject; bh=juKqj/2F0ACYglCWRYuu/ewPQsPgg3Y9Bx5FHKy2hZs=; b=g+dViP6n8P2MLGVszAI3knyyyYrXY1KdhZ2cDjJWTcPdvByNLW/ylWehO3bDDklssO 9pAWzS+KbYojkWTLCPojRjruCGhwynYwIDCHUXtcWX7uNThcqwoRFj3sOuRx4GseUQjs vZBk8neGyyPv18HQFRcBdaBSm0ZWw6DCH9uQHB1Qq8po6e/cqNxmc/ieJX0y1biRGNyi W5d/1vPO0FriKo60Sx5DCbSKRh/eGW+6PyLsT5bghtBsQxsluptOaDBl4LK7TU3gI/2C yy19lRyfwVez5RYmm+bq5CRO+7QD1bPgmsWBY7C7iKpF2MzgGEjttr1RS/3oWe1gmSTu a5xA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n9-v6si20341013pgt.267.2018.10.09.09.47.41; Tue, 09 Oct 2018 09:47:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726537AbeJJADw (ORCPT + 99 others); Tue, 9 Oct 2018 20:03:52 -0400 Received: from mout.kundenserver.de ([212.227.126.133]:51543 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726393AbeJJADw (ORCPT ); Tue, 9 Oct 2018 20:03:52 -0400 Received: from [192.168.100.1] ([78.238.229.36]) by mrelayeu.kundenserver.de (mreue012 [212.227.15.167]) with ESMTPSA (Nemesis) id 1MbTCr-1fYeRV05Un-00bvDr; Tue, 09 Oct 2018 18:45:20 +0200 Received: from [192.168.100.1] ([78.238.229.36]) by mrelayeu.kundenserver.de (mreue012 [212.227.15.167]) with ESMTPSA (Nemesis) id 1MbTCr-1fYeRV05Un-00bvDr; Tue, 09 Oct 2018 18:45:20 +0200 Subject: Re: [RFC v5 1/1] ns: add binfmt_misc to the user namespace To: Kirill Tkhai , "linux-kernel@vger.kernel.org" Cc: Eric Biederman , Dmitry Safonov , "linux-api@vger.kernel.org" , James Bottomley , Alexander Viro , "linux-fsdevel@vger.kernel.org" , "Andrei Vagin (C)" , "containers@lists.linux-foundation.org" , Jann Horn References: <20181009103752.21482-1-laurent@vivier.eu> <20181009103752.21482-2-laurent@vivier.eu> From: Laurent Vivier Openpgp: preference=signencrypt Autocrypt: addr=laurent@vivier.eu; prefer-encrypt=mutual; keydata= xsFNBFYFJhkBEAC2me7w2+RizYOKZM+vZCx69GTewOwqzHrrHSG07MUAxJ6AY29/+HYf6EY2 WoeuLWDmXE7A3oJoIsRecD6BXHTb0OYS20lS608anr3B0xn5g0BX7es9Mw+hV/pL+63EOCVm SUVTEQwbGQN62guOKnJJJfphbbv82glIC/Ei4Ky8BwZkUuXd7d5NFJKC9/GDrbWdj75cDNQx UZ9XXbXEKY9MHX83Uy7JFoiFDMOVHn55HnncflUncO0zDzY7CxFeQFwYRbsCXOUL9yBtqLer Ky8/yjBskIlNrp0uQSt9LMoMsdSjYLYhvk1StsNPg74+s4u0Q6z45+l8RAsgLw5OLtTa+ePM JyS7OIGNYxAX6eZk1+91a6tnqfyPcMbduxyBaYXn94HUG162BeuyBkbNoIDkB7pCByed1A7q q9/FbuTDwgVGVLYthYSfTtN0Y60OgNkWCMtFwKxRaXt1WFA5ceqinN/XkgA+vf2Ch72zBkJL RBIhfOPFv5f2Hkkj0MvsUXpOWaOjatiu0fpPo6Hw14UEpywke1zN4NKubApQOlNKZZC4hu6/ 8pv2t4HRi7s0K88jQYBRPObjrN5+owtI51xMaYzvPitHQ2053LmgsOdN9EKOqZeHAYG2SmRW LOxYWKX14YkZI5j/TXfKlTpwSMvXho+efN4kgFvFmP6WT+tPnwARAQABzSNMYXVyZW50IFZp dmllciA8bHZpdmllckByZWRoYXQuY29tPsLBeAQTAQIAIgUCVgVQgAIbAwYLCQgHAwIGFQgC CQoLBBYCAwECHgECF4AACgkQ8ww4vT8vvjwpgg//fSGy0Rs/t8cPFuzoY1cex4limJQfReLr SJXCANg9NOWy/bFK5wunj+h/RCFxIFhZcyXveurkBwYikDPUrBoBRoOJY/BHK0iZo7/WQkur 6H5losVZtrotmKOGnP/lJYZ3H6OWvXzdz8LL5hb3TvGOP68K8Bn8UsIaZJoeiKhaNR0sOJyI YYbgFQPWMHfVwHD/U+/gqRhD7apVysxv5by/pKDln1I5v0cRRH6hd8M8oXgKhF2+rAOL7gvh jEHSSWKUlMjC7YwwjSZmUkL+TQyE18e2XBk85X8Da3FznrLiHZFHQ/NzETYxRjnOzD7/kOVy gKD/o7asyWQVU65mh/ECrtjfhtCBSYmIIVkopoLaVJ/kEbVJQegT2P6NgERC/31kmTF69vn8 uQyW11Hk8tyubicByL3/XVBrq4jZdJW3cePNJbTNaT0d/bjMg5zCWHbMErUib2Nellnbg6bc 2HLDe0NLVPuRZhHUHM9hO/JNnHfvgiRQDh6loNOUnm9Iw2YiVgZNnT4soUehMZ7au8PwSl4I KYE4ulJ8RRiydN7fES3IZWmOPlyskp1QMQBD/w16o+lEtY6HSFEzsK3o0vuBRBVp2WKnssVH qeeV01ZHw0bvWKjxVNOksP98eJfWLfV9l9e7s6TaAeySKRRubtJ+21PRuYAxKsaueBfUE7ZT 7zfOwU0EVgUmGQEQALxSQRbl/QOnmssVDxWhHM5TGxl7oLNJms2zmBpcmlrIsn8nNz0rRyxT 460k2niaTwowSRK8KWVDeAW6ZAaWiYjLlTunoKwvF8vP3JyWpBz0diTxL5o+xpvy/Q6YU3BN efdq8Vy3rFsxgW7mMSrI/CxJ667y8ot5DVugeS2NyHfmZlPGE0Nsy7hlebS4liisXOrN3jFz asKyUws3VXek4V65lHwB23BVzsnFMn/bw/rPliqXGcwl8CoJu8dSyrCcd1Ibs0/Inq9S9+t0 VmWiQWfQkz4rvEeTQkp/VfgZ6z98JRW7S6l6eophoWs0/ZyRfOm+QVSqRfFZdxdP2PlGeIFM C3fXJgygXJkFPyWkVElr76JTbtSHsGWbt6xUlYHKXWo+xf9WgtLeby3cfSkEchACrxDrQpj+ Jt/JFP+q997dybkyZ5IoHWuPkn7uZGBrKIHmBunTco1+cKSuRiSCYpBIXZMHCzPgVDjk4viP brV9NwRkmaOxVvye0vctJeWvJ6KA7NoAURplIGCqkCRwg0MmLrfoZnK/gRqVJ/f6adhU1oo6 z4p2/z3PemA0C0ANatgHgBb90cd16AUxpdEQmOCmdNnNJF/3Zt3inzF+NFzHoM5Vwq6rc1JP jfC3oqRLJzqAEHBDjQFlqNR3IFCIAo4SYQRBdAHBCzkM4rWyRhuVABEBAAHCwV8EGAECAAkF AlYFJhkCGwwACgkQ8ww4vT8vvjwg9w//VQrcnVg3TsjEybxDEUBm8dBmnKqcnTBFmxN5FFtI WlEuY8+YMiWRykd8Ln9RJ/98/ghABHz9TN8TRo2b6WimV64FmlVn17Ri6FgFU3xNt9TTEChq AcNg88eYryKsYpFwegGpwUlaUaaGh1m9OrTzcQy+klVfZWaVJ9Nw0keoGRGb8j4XjVpL8+2x OhXKrM1fzzb8JtAuSbuzZSQPDwQEI5CKKxp7zf76J21YeRrEW4WDznPyVcDTa+tz++q2S/Bp P4W98bXCBIuQgs2m+OflERv5c3Ojldp04/S4NEjXEYRWdiCxN7ca5iPml5gLtuvhJMSy36gl U6IW9kn30IWuSoBpTkgV7rLUEhh9Ms82VWW/h2TxL8enfx40PrfbDtWwqRID3WY8jLrjKfTd R3LW8BnUDNkG+c4FzvvGUs8AvuqxxyHbXAfDx9o/jXfPHVRmJVhSmd+hC3mcQ+4iX5bBPBPM oDqSoLt5w9GoQQ6gDVP2ZjTWqwSRMLzNr37rJjZ1pt0DCMMTbiYIUcrhX8eveCJtY7NGWNyx FCRkhxRuGcpwPmRVDwOl39MB3iTsRighiMnijkbLXiKoJ5CDVvX5yicNqYJPKh5MFXN1bvsB kmYiStMRbrD0HoY1kx5/VozBtc70OU0EB8Wrv9hZD+Ofp0T3KOr1RUHvCZoLURfFhSQ= Message-ID: Date: Tue, 9 Oct 2018 18:45:15 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Provags-ID: V03:K1:u3zUgVT+uXBlsdXnJZR+3NGK0+xYDW+SZG6EiYyzF058Rr9HQoq ZwLI0MlG7JoPn5oPrGW+hnPbxVMjnohYCbSiQlZtJHohKqTf4CJf1M/x6Vsf4/d5oeRtk6D qAuoIOomXWa1Y8ZMBwioo+pjVr73fOiD70hhedHRzDD7TWcwOcWrPGtuEKKQkfVJ2jyBLYY 46jIHIIVtO5HJfyWbGcBQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V01:K0:ZW+CwWFkqhs=:otO1BZZKrkLvpsZjVTXJSt AKs6+YSweHGHO+CI0gbh43GmPLDD50xvKYVe9j6AojL1rtQLslax4ZmcHycUrI8NFzjz1xpak k8vJJPkXpGmclvt+xFP/1Ig9b8xSr6LpskuKVzouSC5vSBHn72oOfNWplBJjv3CDsilkSz3Pg vWohQQ4YTkCHVL/X/Wep/IjsjHQMkoxTpCUl2hy5lVjRakQCtgKkFhbE+gYQ+xabFyH18AHW3 dVoawI8KfPfG+ioT6HED+PYqwMbkj2T+ZhcAMn0GF8rQHBTnVFX8Jd8MLzoCdWsWqmhaGdnBe BaHu/PzoKO/KwNz6cFshymG81YwHNYgYUO5be65XaGXMfutbu5BrOSHXm6qNJ8cCHkl58Jsmr rxJJnJApM5BffSKfsQk8Hp8WGCGRHYSebrl8mvW2kJACbgkfXYpUdDde+YN+3xi16cbQJaCm6 8m7QOCgvnVvXRd5USTAgLWCKRM+iTH+O98SFAcAAqNr2nUDAQFFAJjxtO3ex2pOHa/+PpM2GM iGkL1MGQKNFVfaCMJ4+bAc5ScMNpc+xmFuWYmeLlNR7Q8TwKJ/pqGQ11YD16L6kt5JU03LcIH PxhwoIxHItDQX4F9qtbZkBmM+s0DJTqsMXveI7eI/e7eyUKiPXodoBfmGGjWk6KK7i5OP5Ceo 1S+G/qPrysG+k17GLQu+cqPx2JqmRLZ3TSkd3HCFGoIbhPurMh2f6TXMW7Dmjd4NNZ5jBYEgy SYfYTa0HQg26pJTR Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 09/10/2018 à 18:15, Kirill Tkhai a écrit : > On 09.10.2018 13:37, Laurent Vivier wrote: >> This patch allows to have a different binfmt_misc configuration >> for each new user namespace. By default, the binfmt_misc configuration >> is the one of the previous level, but if the binfmt_misc filesystem is >> mounted in the new namespace a new empty binfmt instance is created and >> used in this namespace. >> >> For instance, using "unshare" we can start a chroot of an another >> architecture and configure the binfmt_misc interpreter without being root >> to run the binaries in this chroot. >> >> Signed-off-by: Laurent Vivier >> --- >> fs/binfmt_misc.c | 106 ++++++++++++++++++++++++--------- >> include/linux/user_namespace.h | 13 ++++ >> kernel/user.c | 13 ++++ >> kernel/user_namespace.c | 3 + >> 4 files changed, 107 insertions(+), 28 deletions(-) >> >> diff --git a/fs/binfmt_misc.c b/fs/binfmt_misc.c >> index aa4a7a23ff99..1e0029d097d9 100644 >> --- a/fs/binfmt_misc.c >> +++ b/fs/binfmt_misc.c ... >> @@ -80,18 +74,32 @@ static int entry_count; >> */ >> #define MAX_REGISTER_LENGTH 1920 >> >> +static struct binfmt_namespace *binfmt_ns(struct user_namespace *ns) >> +{ >> + struct binfmt_namespace *b_ns; >> + >> + while (ns) { >> + b_ns = READ_ONCE(ns->binfmt_ns); >> + if (b_ns) >> + return b_ns; >> + ns = ns->parent; >> + } >> + WARN_ON_ONCE(1); >> + return NULL; >> +} >> + ... >> @@ -823,12 +847,34 @@ static const struct super_operations s_ops = { >> static int bm_fill_super(struct super_block *sb, void *data, int silent) >> { >> int err; >> + struct user_namespace *ns = sb->s_user_ns; >> static const struct tree_descr bm_files[] = { >> [2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO}, >> [3] = {"register", &bm_register_operations, S_IWUSR}, >> /* last one */ {""} >> }; >> >> + /* create a new binfmt namespace >> + * if we are not in the first user namespace >> + * but the binfmt namespace is the first one >> + */ >> + if (READ_ONCE(ns->binfmt_ns) == NULL) { >> + struct binfmt_namespace *new_ns; >> + >> + new_ns = kmalloc(sizeof(struct binfmt_namespace), >> + GFP_KERNEL); >> + if (new_ns == NULL) >> + return -ENOMEM; >> + INIT_LIST_HEAD(&new_ns->entries); >> + new_ns->enabled = 1; >> + rwlock_init(&new_ns->entries_lock); >> + new_ns->bm_mnt = NULL; >> + new_ns->entry_count = 0; >> + /* ensure new_ns is completely initialized before sharing it */ >> + smp_wmb(); > > (I haven't dived into patch logic, here just small barrier remark from quick sight). > smp_wmb() has no sense without paired smp_rmb() on the read side. Possible, > you want something like below in read hunk: > > + b_ns = READ_ONCE(ns->binfmt_ns); > + if (b_ns) { > + smp_rmb(); > + return b_ns; > + } > > The write barrier is here to ensure the structure is fully written before we set the pointer. I don't understand how read barrier can change something at this level, IMHO the couple WRITE_ONCE()/READ_ONCE() should be enough to ensure we have correctly initialized the pointer and the structure when we read the pointer back. I think the pointer itself is the "barrier" to access the memory modified before. Thanks, Laurent