Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp348539ybc; Tue, 12 Nov 2019 02:26:21 -0800 (PST) X-Google-Smtp-Source: APXvYqxgvnwgBJI0Isau/qKdXV/8FupeiuPx3i4FAIYFvlgBrXDBZCjWQr90nRj5hP17pCu+TEl7 X-Received: by 2002:a17:906:1342:: with SMTP id x2mr27704527ejb.304.1573554380937; Tue, 12 Nov 2019 02:26:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573554380; cv=none; d=google.com; s=arc-20160816; b=d/MnufmiisZVChhcfnJqyHyj862HDHWX5j/dQKuYvGrcEFrstUM+rxZzGlmFT+bDD/ lFEVojY3V2Yn69hjMEbhtl5q/I/PTBvrSZrVDxLsp5DlhzrIR/KCA/Xy8XKHJGx4sivy f6J5cdSlxFAFjBRfPhSqTXsZEvjj1hguM7hyOnirA/6R/LVjd2e5Z1P/0S5QAioHP0lr sq6wtEfEazdMvXByacSy0fql/JkgmMU9XxKx+DB4TkmLb6CkDb8nKU3EoNN9+DtXJ8mf 8Rh0kLOC+Ju5vnbTUaCPVUAZ0eTcNZ48BNys2ueb8FkKBmQGNYfOJ7c12rkuc9hQVSYH ojWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=cdPMca+jxKyPbIcrQSjTczqJKkmL6XenS3Qubicbdls=; b=wCZtx8CDNjHgiGY4Y82zx0yjGXUXLgf9yGBApocUCnD9vQO+iuiQhbyjrmGDPbB+My 5CQPIkQObXuwpXXzbO/PuXLs7XypfqnGeVx//mnWd5dm3xFKcn7urI12jwhsqY1/JQ8y d06OtVMIUvQVkfWzgksE4fVJIGJCdS0ttQUqKM3ZwtYFXL+m151R6T+Ttmt/dHH/TusO pXUwxAJGc1JIK+mR76WiO0lna0GN3qZ51gGO3qQ2gb+8cEjFRD6xgWSBy8yDkK+QGX39 25lr/C9Sgg4A512Xslp2CXIrOGmI1ODkc6deGNZK1AISMlZ2LheJZYOR5au6w2WZQJct iv/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q25si11836855edw.222.2019.11.12.02.25.56; Tue, 12 Nov 2019 02:26:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725957AbfKLKZT (ORCPT + 99 others); Tue, 12 Nov 2019 05:25:19 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:46585 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725853AbfKLKZT (ORCPT ); Tue, 12 Nov 2019 05:25:19 -0500 Received: from p54ac5726.dip0.t-ipconnect.de ([84.172.87.38] helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iUTM2-0003JS-FQ; Tue, 12 Nov 2019 10:24:58 +0000 Date: Tue, 12 Nov 2019 11:24:56 +0100 From: Christian Brauner To: "Eric W. Biederman" Cc: Adrian Reber , Oleg Nesterov , Pavel Emelyanov , Jann Horn , Dmitry Safonov <0x7f454c46@gmail.com>, linux-kernel@vger.kernel.org, Andrei Vagin , Mike Rapoport , Radostin Stoyanov Subject: Re: [PATCH v7 1/2] fork: extend clone3() to support setting a PID Message-ID: <20191112102455.7uzwtahdd5ssoelm@wittgenstein> References: <20191111131704.656169-1-areber@redhat.com> <20191111152514.GA11389@redhat.com> <20191111154028.GF514519@dcbz.redhat.com> <20191111161458.fjodxyx566dar6ob@wittgenstein> <87ftiuau46.fsf@x220.int.ebiederm.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <87ftiuau46.fsf@x220.int.ebiederm.org> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 11, 2019 at 05:08:57PM -0600, Eric W. Biederman wrote: > Christian Brauner writes: > > > On Mon, Nov 11, 2019 at 04:40:28PM +0100, Adrian Reber wrote: > >> On Mon, Nov 11, 2019 at 04:25:15PM +0100, Oleg Nesterov wrote: > >> > On 11/11, Adrian Reber wrote: > >> > > > >> > > v7: > >> > > - changed set_tid to be an array to set the PID of a process > >> > > in multiple nested PID namespaces at the same time as discussed > >> > > at LPC 2019 (container MC) > >> > > >> > cough... iirc you convinced me this is not needed when we discussed > >> > the previous version ;) Nevermind, probably my memory fools me. > >> > >> You are right. You suggested the same thing and we didn't listen ;) > >> > >> > So far I only have some cosmetic nits, > >> > >> Thanks for the quick review. I will try to apply your suggestions. > >> > >> > > @@ -175,6 +187,18 @@ struct pid *alloc_pid(struct pid_namespace *ns) > >> > > > >> > > for (i = ns->level; i >= 0; i--) { > >> > > int pid_min = 1; > >> > > + int t_pos = 0; > >> > ^^^^^ > >> > > >> > I won't insist, but I'd suggest to cache set_tid[t_pos] instead to make > >> > the code a bit more simple. > >> > > >> > > @@ -186,12 +210,24 @@ struct pid *alloc_pid(struct pid_namespace *ns) > >> > > if (idr_get_cursor(&tmp->idr) > RESERVED_PIDS) > >> > > pid_min = RESERVED_PIDS; > >> > > >> > You can probably move this code into the "else" branch below. > >> > > >> > IOW, something like > >> > > >> > > >> > for (i = ns->level; i >= 0; i--) { > >> > int xxx = 0; > >> > > >> > if (set_tid_size) { > >> > int pos = ns->level - i; > >> > > >> > xxx = set_tid[pos]; > >> > if (xxx < 1 || xxx >= pid_max) > >> > return ERR_PTR(-EINVAL); > >> > /* Also fail if a PID != 1 is requested and no PID 1 exists */ > >> > if (xxx != 1 && !tmp->child_reaper) > >> > return ERR_PTR(-EINVAL); > >> > if (!ns_capable(tmp->user_ns, CAP_SYS_ADMIN)) > >> > return ERR_PTR(-EPERM); > >> > set_tid_size--; > >> > } > >> > > >> > idr_preload(GFP_KERNEL); > >> > spin_lock_irq(&pidmap_lock); > >> > > >> > if (xxx) { > >> > nr = idr_alloc(&tmp->idr, NULL, xxx, xxx + 1, > >> > GFP_ATOMIC); > >> > /* > >> > * If ENOSPC is returned it means that the PID is > >> > * alreay in use. Return EEXIST in that case. > >> > */ > >> > if (nr == -ENOSPC) > >> > nr = -EEXIST; > >> > } else { > >> > int pid_min = 1; > >> > /* > >> > * init really needs pid 1, but after reaching the > >> > * maximum wrap back to RESERVED_PIDS > >> > */ > >> > if (idr_get_cursor(&tmp->idr) > RESERVED_PIDS) > >> > pid_min = RESERVED_PIDS; > >> > /* > >> > * Store a null pointer so find_pid_ns does not find > >> > * a partially initialized PID (see below). > >> > */ > >> > nr = idr_alloc_cyclic(&tmp->idr, NULL, pid_min, > >> > pid_max, GFP_ATOMIC); > >> > } > >> > > >> > ... > >> > > >> > This way only the "if (set_tid_size)" block has to play with set_tid_size/set_tid. > >> > > >> > note also that this way we can easily allow set_tid[some_level] == 0, we can > >> > simply do > >> > > >> > - if (xxx < 1 || xxx >= pid_max) > >> > + if (xxx < 0 || xxx >= pid_max) > >> > > >> > although I don't think this is really useful. > >> > >> Yes. I explicitly didn't allow 0 as a PID as I didn't thought it would > >> be useful (or maybe even valid). > > I agree not allowing 0 sounds very reasonable. Yeah, I think we are all in agreement here. > > > How do you express: I don't care about a specific pid in pidns level > > , just give me a random one? For example, > > > > set_tid[0] = 1234 > > set_tid[1] = 5678 > > set_tid[2] = random_pid() > > set_tid[3] = 9 > > > > Wouldn't that be potentially useful? > > I can't imagine how. > > At least in my head the fundamental concept is picking up a container on > one machine and moving it to another machine. For that operation you > will know starting with the most nested pid namespace the pids that you > want up to some point. Farther up you don't know. > > I can't imagine in what scenario you would not know a pid at outer level > but want a specified pid at an ever farther removed outer level. What > scenario are you thinking about that could lead to such a situation? > > For the me the question is: Are you restoring what you know or not? I didn't advocate for making this possible (though I can see how this would be a neat hacking tool). Though this whole paragraph highlights one of my concerns with this whole feature. As it stands it is _only_ useful to CRIU. Which as I said before is fine but it still makes me queasy when an interface really just is designed to serve a single use-case; this specific feature even just a single user. I'm hopeful that we can find other use-cases for testing. It's probably already a fun feature for making pid-reuse based kernel exploits way easier. Christian