Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1170187ybp; Fri, 11 Oct 2019 09:59:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpHfN2WstyUVHCUkDgFw4fY9Ox9jvv9AcpYYjTxIJItqD+OM0x0fqB/VGUPODo8KYpJXl1 X-Received: by 2002:a17:906:fca8:: with SMTP id qw8mr15268979ejb.188.1570813186340; Fri, 11 Oct 2019 09:59:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570813186; cv=none; d=google.com; s=arc-20160816; b=U+M9yhdSZNHZX/YdG+skXZspp9ROVJu5ucllpUrT0/vToZC1/BDBzC5M1N8op1Vbkh mFbwZQeByp3Cwy10XGnllmK/BELKEc6XjW2xkHm8b2ddjFfNRWWKxN/NnYIBuYAdHD2Z 7wEhAHTQX8a86l8vk0lffgyIjN3QM6laOA2c3MKHdWJ56yJ9ifzkFi2vDJsVSatACPR5 G1Q3TdQytmxIJnOmb0wMBrrUweKYt+uF5+xcl9jHYSXkHD59fDxVhYu/MaTnkTwTm+UC 2LSdka/0oyx6NQLFBetyMwP82WrN2e5//jHvJ1+kP16aQX1nLadfHUYX6a/yTTyjebmQ fWfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=iSXTbd5d01Q6o/aWX51TG/CJ9zawrHTbkcRjipmf3CA=; b=X/tiCu3SmBXcVfDswdGmstCVOlWQJGqt2JcST0GF/RpvDBBntOWGCqL8ogaLnj5AxD +rOhLmmDjpPXdapUNI/dRErgRQivzOpHUjNedvC9Yi2p//7MnxjqqGCMSPhYmRson/ws Tn6bJeKGT1k2ci3MtUix8T6UquSLc0G+UO7wegt/kIkAuwG1IZQoQ2PH2c/t4D6o87uH OBQ6LKQ6+VjGE0qwJvxmu21k3fRnC/ATjWQI+PhYZpkAQI9S0e6vsOx3jTUsntkerMh2 b0s7LDkQPMfAg4UgvFRZN43+5W7SizkRY+CtC4/BYqsgNdi28NrUSg6vdN+HjqJu7jOE EiBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8si5562957ejx.315.2019.10.11.09.59.22; Fri, 11 Oct 2019 09:59:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728599AbfJKQ7A (ORCPT + 99 others); Fri, 11 Oct 2019 12:59:00 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:48670 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728167AbfJKQ67 (ORCPT ); Fri, 11 Oct 2019 12:58:59 -0400 Received: from [213.220.153.21] (helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iIyFh-0002XC-RN; Fri, 11 Oct 2019 16:58:53 +0000 Date: Fri, 11 Oct 2019 18:58:53 +0200 From: Christian Brauner To: Jann Horn Cc: Christian Kellner , kernel list , Linux API , Christian Kellner , Andrew Morton , "Peter Zijlstra (Intel)" , Ingo Molnar , Michal Hocko , Thomas Gleixner , Elena Reshetova , Roman Gushchin , Andrea Arcangeli , Al Viro , Aleksa Sarai , "Dmitry V. Levin" Subject: Re: [PATCH v3 1/2] pidfd: show pids for nested pid namespaces in fdinfo Message-ID: <20191011165851.gf5i6qw2fwbunshr@wittgenstein> References: <20191009160532.20674-1-ckellner@redhat.com> <20191011122323.7770-1-ckellner@redhat.com> <20191011151700.hdvztoxonpvogadv@wittgenstein> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 11, 2019 at 05:30:03PM +0200, Jann Horn wrote: > On Fri, Oct 11, 2019 at 5:17 PM Christian Brauner > wrote: > > > > On Fri, Oct 11, 2019 at 04:55:59PM +0200, Jann Horn wrote: > > > On Fri, Oct 11, 2019 at 2:23 PM Christian Kellner wrote: > > > > The fdinfo file for a process file descriptor already contains the > > > > pid of the process in the callers namespaces. Additionally, if pid > > > > namespaces are configured, show the process ids of the process in > > > > all nested namespaces in the same format as in the procfs status > > > > file, i.e. "NSPid:\t%d\%d...". This allows the easy identification > > > > of the processes in nested namespaces. > > > [...] > > > > #ifdef CONFIG_PROC_FS > > > > +static inline void print_pidfd_nspid(struct seq_file *m, struct pid *pid, > > > > + struct pid_namespace *ns) > > > > > > `ns` is the namespace of the PID namespace of the procfs instance > > > through which the file descriptor is being viewed. > > > > > > > +{ > > > > +#ifdef CONFIG_PID_NS > > > > + int i; > > > > + > > > > + seq_puts(m, "\nNSpid:"); > > > > + for (i = ns->level; i <= pid->level; i++) { > > > > > > ns->level is the level of the PID namespace associated with the procfs > > > instance through which the file descriptor is being viewed. pid->level > > > is the level of the PID associated with the pidfd. > > > > > > > + ns = pid->numbers[i].ns; > > > > + seq_put_decimal_ull(m, "\t", pid_nr_ns(pid, ns)); > > > > + } > > > > +#endif > > > > +} > > > > > > I think you assumed that `ns` is always going to contain `pid`. > > > However, that's not the case. Consider the following scenario: > > > > > > - the init_pid_ns has two child PID namespaces, A and B (each with > > > its own mount namespace and procfs instance) > > > - process P1 lives in A > > > - process P2 lives in B > > > - P1 opens a pidfd for itself > > > - P1 passes the pidfd to P2 (e.g. via a unix domain socket) > > > - P2 reads /proc/self/fdinfo/$pidfd > > > > > > Now the loop will print the ID of P1 in A. I don't think that's what > > > you intended? You might want to bail out if "pid_nr_ns(pid, ns) == 0", > > > or something like that. > > > > I assumed the same thing happens when you pass around an fd for > > /proc/self/status and that's why I didn't object to this behavior. > > I don't see how /proc/$pid/status is relevant. In the > /proc/$pid/status case, the output is the list of PIDs starting at the > PID namespace the procfs is associated with; and the process is always > contained in that namespace, which also means that the first PID > listed is the one in the PID namespace of the procfs instance. In the > pidfd case, the process is not necessarily contained in that > namespace, and the output doesn't make sense. I might be misreading what you're saying. (Maybe I'm doing something obviously wrong.) If I compile the following two programs: b2: https://paste.ubuntu.com/p/xthMsCXy3s/ c2: https://paste.ubuntu.com/p/y5HSzyMQJr/ Then in shell1 sudo unshare --mount --pid --fork --mount-proc and in shell2 sudo unshare --mount --pid --fork --mount-proc and run b2 in shell1 and c2 in shell2 which sends around an fd for /proc/b2/status to c2. Now c2 reads b2's status file via the fd it received. The c2 will see the pid of b2 in b2's pid namespace even though the process is not contained in the pid namespace of c2. Christian