Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1111244imm; Wed, 10 Oct 2018 09:16:00 -0700 (PDT) X-Google-Smtp-Source: ACcGV63tdrvHJ/ndezIb4r1boNpAF4EPWOlVxvEQLqH6UaIQpkvZ/nXhwqzrtVG8oScZsSo4dytg X-Received: by 2002:a17:902:b58c:: with SMTP id a12-v6mr81039pls.226.1539188160613; Wed, 10 Oct 2018 09:16:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539188160; cv=none; d=google.com; s=arc-20160816; b=aF9fXCLEefcMweUOaxktJWr4lMaXVWfJw62A+7Q5K8/ajqezjl0cY2IDQp7KqT+FEa sCNUPABW/G71xl30O/PBk+6MOorXKynPptwsppKMq5gg5u4cnml/Fk+WbBsAMEtHcQzU Y/lwvZ1JYXosPFZ8sGsFTPQHbBOxP2WRo6uNmKvU1REhsRCNFOpfk3Mx03mN3Vq6Tcm1 /ogY2tGgmw0hwU/FKTLunKLuiTQ8mdr+CPEc0zAaTB6yPKZ4G8pN5iZFd23/sDq1Coyw /HMrMGFxkSRyfpOoxilJXtJPzLRZ0+XO4/5nWiYUqc0oTSqJ3iJd8w8w3JV46wk+NnuD 7Kxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=k99HL0jIm5CeTuH84ztoQSDHcMZSPIbjHgUZ+juRZ/o=; b=WwACklXpMt+kVxykeocp3XQQS54HGqwlgjNNk/7F/kqUEuOKFR2xtGMKV9SyjwoXll HupOHttByBqE0P9LHuJOMnGanetlvlmueXQDQ2rwW6obqHzzy1p/mZ/HylNY09yu3coe /UqyJcjdiYimHK5Y9RtukMA68UDKL1a46rkYKWvTexQm91BFHQIy74e2xqg2TUPy7+w0 dhyqkzG35jicrfSwuq8NoYp7RBJ/kOiMoZZ7urU/1Gc35XTqPeyxQZyqaSIZ39bfPrea uxVY8Q1dEWOSMr1ZWgCWswUnzyYfBeVt1m/W6DcnGr8BXOA67ZWyUh6Kt0vIUXci/A0x pAEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p6-v6si4077plk.429.2018.10.10.09.15.45; Wed, 10 Oct 2018 09:16:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727082AbeJJXiD (ORCPT + 99 others); Wed, 10 Oct 2018 19:38:03 -0400 Received: from mout.kundenserver.de ([212.227.126.134]:45173 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726722AbeJJXiD (ORCPT ); Wed, 10 Oct 2018 19:38:03 -0400 Received: from localhost.localdomain ([78.238.229.36]) by mrelayeu.kundenserver.de (mreue010 [212.227.15.167]) with ESMTPSA (Nemesis) id 1N2Dgk-1fgCoL2SAY-013aSJ; Wed, 10 Oct 2018 18:14:39 +0200 Received: from localhost.localdomain ([78.238.229.36]) by mrelayeu.kundenserver.de (mreue010 [212.227.15.167]) with ESMTPSA (Nemesis) id 1N2Dgk-1fgCoL2SAY-013aSJ; Wed, 10 Oct 2018 18:14:39 +0200 From: Laurent Vivier To: linux-kernel@vger.kernel.org Cc: Jann Horn , James Bottomley , linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrei Vagin , Alexander Viro , Eric Biederman , containers@lists.linux-foundation.org, Dmitry Safonov , Laurent Vivier Subject: [PATCH v6 0/1] ns: introduce binfmt_misc namespace Date: Wed, 10 Oct 2018 18:14:29 +0200 Message-Id: <20181010161430.11633-1-laurent@vivier.eu> X-Mailer: git-send-email 2.17.1 X-Provags-ID: V03:K1:vc1979bSNQL5EburbOm7u8gr5g946Z6pVVthZuBLvswFf/SBOsE Wvj6zfyM9DvKuVZwgiIXoop/ZPMFB5V8CfxnPTrhZgMeXmsK5uDojspmEBvOV1vuL5Xt8kv chBozx0MbprRJ9h33ni3+uhn4o2IAGlX06ON7Dh7FgereAbs2hReWiBF0WXqUioqwg1/FG7 +9K5yr+/nIK6Rm0Tgm6OA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V01:K0:WdmLuZV0lnc=:6qQQ8p3bxqajVB1/6jlTLM wcU9TOAtIlR8JAtzBsNmKDmtvKzI885L7UXdRqphAJoYCd5IDFLIdIqQ9fr+TsHkpL2dT3rrS 1ht6EZFVLKY8eQo5TN22RqOroV4IsqpB3jO+X9+0ZZy1u1QzmRB88LaoP4eHk5WaX32nj6nda 95fDgf/hVIuJJC1qBSsxaD+1WQjrVomOJabpHXO2A6SDlMhwaUxsMrRMghZfqW3/0V0GxAqfB +I2069UZskIavqWKoQ8f7qL2pxafW30jZLAwpCS/Iutk3VV1Yss/3srLJSNikLya1daKWqu77 XosfML5b2vKnbS5iymTT+Bjr1Dk/Wpijk0dbQHACrURhSQmd4WcEhqJh/kYP65e3XwKOE4EqJ 1H+Y2Q3zKpTITSzohM+ZkJ8sLbu0cprpde3ns6tmPuO6fBYdQROuz9/erTQwBFcbsfR4NqyeF gZTF4gZO9mtrK12KJkE//QqfQROi1PKXcNQapJYLhqW9oBlpRZKTAOikTEDyReN8JiOi5xoGN jAnNu1tDK78FzJjo3+EUPixL9G+0CSeF0c/XhH23zhOPLIzWJ5EebBNoYwOpjqLCFJHljTZJy 27Q4oiGThL8UrKyFc2l1DizNisBXFKo8FfMQckoQ/KEi1116fNUJRhw0v/F0MrT98Bk8NZe7F c8s43qwxRr8AezRKP2E998geoyNXZUqvqVXA1dPbmZgZ5Cw2Z0J5n41RenXfGB1+cecM= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org v6: Return &init_binfmt_ns instead of NULL in binfmt_ns() This should never happen, but to stay safe return a value we can use. change subject from "RFC" to "PATCH" v5: Use READ_ONCE()/WRITE_ONCE() move mount pointer struct init to bm_fill_super() and add smp_wmb() remove useless NULL value init add WARN_ON_ONCE() v4: first user namespace is initialized with &init_binfmt_ns, all new user namespaces are initialized with a NULL and use the one of the first parent that is not NULL. The pointer is initialized to a valid value the first time the binfmt_misc fs is mounted in the current user namespace. This allows to not change the way it was working before: new ns inherits values from its parent, and if parent value is modified (or parent creates its own binfmt entry by mounting the fs) child inherits it (unless it has itself mounted the fs). v3: create a structure to store binfmt_misc data, add a pointer to this structure in the user_namespace structure, in init_user_ns structure this pointer points to an init_binfmt_ns structure. And all new user namespaces point to this init structure. A new binfmt namespace structure is allocated if the binfmt_misc filesystem is mounted in a user namespace that is not the initial one but its binfmt namespace pointer points to the initial one. add override_creds()/revert_creds() around open_exec() in bm_register_write() v2: no new namespace, binfmt_misc data are now part of the mount namespace I put this in mount namespace instead of user namespace because the mount namespace is already needed and I don't want to force to have the user namespace for that. As this is a filesystem, it seems logic to have it here. This allows to define a new interpreter for each new container. But the main goal is to be able to chroot to a directory using a binfmt_misc interpreter without being root. I have a modified version of unshare at: git@github.com:vivier/util-linux.git branch unshare-chroot with some new options to unshare binfmt_misc namespace and to chroot to a directory. If you have a directory /chroot/powerpc/jessie containing debian for powerpc binaries and a qemu-ppc interpreter, you can do for instance: $ uname -a Linux fedora28-wor-2 4.19.0-rc5+ #18 SMP Mon Oct 1 00:32:34 CEST 2018 x86_64 x86_64 x86_64 GNU/Linux $ ./unshare --map-root-user --fork --pid \ --load-interp ":qemu-ppc:M::\x7fELF\x01\x02\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x14:\xff\xff\xff\xff\xff\xff\xff\x00\xff\xff\xff\xff\xff\xff\xff\xff\xff\xfe\xff\xff:/qemu-ppc:OC" \ --root=/chroot/powerpc/jessie /bin/bash -l # uname -a Linux fedora28-wor-2 4.19.0-rc5+ #18 SMP Mon Oct 1 00:32:34 CEST 2018 ppc GNU/Linux # id uid=0(root) gid=0(root) groups=0(root),65534(nogroup) # ls -l total 5940 drwxr-xr-x. 2 nobody nogroup 4096 Aug 12 00:58 bin drwxr-xr-x. 2 nobody nogroup 4096 Jun 17 20:26 boot drwxr-xr-x. 4 nobody nogroup 4096 Aug 12 00:08 dev drwxr-xr-x. 42 nobody nogroup 4096 Sep 28 07:25 etc drwxr-xr-x. 3 nobody nogroup 4096 Sep 28 07:25 home drwxr-xr-x. 9 nobody nogroup 4096 Aug 12 00:58 lib drwxr-xr-x. 2 nobody nogroup 4096 Aug 12 00:08 media drwxr-xr-x. 2 nobody nogroup 4096 Aug 12 00:08 mnt drwxr-xr-x. 3 nobody nogroup 4096 Aug 12 13:09 opt dr-xr-xr-x. 143 nobody nogroup 0 Sep 30 23:02 proc -rwxr-xr-x. 1 nobody nogroup 6009712 Sep 28 07:22 qemu-ppc drwx------. 3 nobody nogroup 4096 Aug 12 12:54 root drwxr-xr-x. 3 nobody nogroup 4096 Aug 12 00:08 run drwxr-xr-x. 2 nobody nogroup 4096 Aug 12 00:58 sbin drwxr-xr-x. 2 nobody nogroup 4096 Aug 12 00:08 srv drwxr-xr-x. 2 nobody nogroup 4096 Apr 6 2015 sys drwxrwxrwt. 2 nobody nogroup 4096 Sep 28 10:31 tmp drwxr-xr-x. 10 nobody nogroup 4096 Aug 12 00:08 usr drwxr-xr-x. 11 nobody nogroup 4096 Aug 12 00:08 var If you want to use the qemu binary provided by your distro, you can use --load-interp ":qemu-ppc:M::\x7fELF\x01\x02\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x14:\xff\xff\xff\xff\xff\xff\xff\x00\xff\xff\xff\xff\xff\xff\xff\xff\xff\xfe\xff\xff:/bin/qemu-ppc-static:OCF" With the 'F' flag, qemu-ppc-static will be then loaded from the main root filesystem before switching to the chroot. Laurent Vivier (1): ns: add binfmt_misc to the user namespace fs/binfmt_misc.c | 111 ++++++++++++++++++++++++--------- include/linux/user_namespace.h | 15 +++++ kernel/user.c | 14 +++++ kernel/user_namespace.c | 3 + 4 files changed, 115 insertions(+), 28 deletions(-) -- 2.17.1