Return-Path: linux-nfs-owner@vger.kernel.org Received: from mail-qg0-f46.google.com ([209.85.192.46]:49949 "EHLO mail-qg0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932470AbaLKNq3 (ORCPT ); Thu, 11 Dec 2014 08:46:29 -0500 Received: by mail-qg0-f46.google.com with SMTP id q107so1675059qgd.19 for ; Thu, 11 Dec 2014 05:46:28 -0800 (PST) From: Jeff Layton Date: Thu, 11 Dec 2014 08:46:26 -0500 To: Ian Kent Cc: Jeff Layton , Benjamin Coddington , David Howells , David =?UTF-8?B?SMOkcmRlbWFu?= , linux-nfs@vger.kernel.org, SteveD@redhat.com Subject: Re: [PATCH 00/19] gssd improvements Message-ID: <20141211084626.7b0d1335@tlielax.poochiereds.net> In-Reply-To: <1418302542.2513.14.camel@pluto.fritz.box> References: <20141210093405.23ffc328@tlielax.poochiereds.net> <20141209053828.24756.89941.stgit@zeus.muc.hardeman.nu> <20141209080923.2708eb4f@tlielax.poochiereds.net> <4639bc17bcb236c23cfaf2bc57d98b67@hardeman.nu> <20141209095813.163ac2bb@tlielax.poochiereds.net> <20141209195530.GA27798@hardeman.nu> <20141210065240.77a23160@tlielax.poochiereds.net> <33fa16f69b18ed67e3fd595b95497941@hardeman.nu> <20141210091734.3c612514@tlielax.poochiereds.net> <32108.1418227382@warthog.procyon.org.uk> <1418256763.2566.61.camel@pluto.fritz.box> <1418268081.2566.67.camel@pluto.fritz.box> <20141211064537.540e2e12@tlielax.poochiereds.net> <1418302542.2513.14.camel@pluto.fritz.box> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-nfs-owner@vger.kernel.org List-ID: On Thu, 11 Dec 2014 20:55:42 +0800 Ian Kent wrote: > On Thu, 2014-12-11 at 06:45 -0500, Jeff Layton wrote: > > On Thu, 11 Dec 2014 11:21:21 +0800 > > Ian Kent wrote: > > > > > On Wed, 2014-12-10 at 20:54 -0500, Benjamin Coddington wrote: > > > > > > > > On Thu, 11 Dec 2014, Ian Kent wrote: > > > > > > > > > On Wed, 2014-12-10 at 18:21 -0500, Benjamin Coddington wrote: > > > > > > On Wed, 10 Dec 2014, David Howells wrote: > > > > > > > > > > > > > Jeff Layton wrote: > > > > > > > > > > > > > > > > This thread might be interesting: > > > > > > > > > https://lkml.org/lkml/2014/11/24/885 > > > > > > > > > > > > > > > > > > > > > > > > > Nice. I wasn't aware that Ian was working on this. I'll take a look. > > > > > > > > > > > > > > I'm not sure what the current state of this is. There was some discussion > > > > > > > over how best to determine which container we need to run in - and it's > > > > > > > complicated by the fact that the mounter may run in a different container to > > > > > > > the program that triggered the mount due to mountpoint propagation. > > > > > > > > > > > > > > David > > > > > > > > > > > > The specific problem of how to run /sbin/request-key in the caller's > > > > > > "container" for idmap and gssd (and other friends) became more generally a > > > > > > problem of how to solve the namespace (or more generally again, "context") > > > > > > problem for some users of kmod's call_usermodehelper. The nice thing about > > > > > > call_usermodehelper is that you don't have to do a lot of work to set up a > > > > > > process to get something done in userspace -- however it is sounding more > > > > > > like we do need to work hard to set up context for some users. > > > > > > > > > > > > The userspace work needs to be done within a context that currently exists > > > > > > or once existed, so the questions are where do we get that context and how > > > > > > do we keep it around until we need it? > > > > > > > > > > > > I think there's agreement that the setup of that context should be basically > > > > > > what's done in fork() for consistency and future work. So we get LSM and > > > > > > cgroups, etc.. in addition to namespaces. > > > > > > > > > > And that's when the usermode helper init function is called, just before > > > > > the exec, so I think that's the place it needs to be done. > > > > > > > > > > > > > > > > > There are two suggested approaches: > > > > > > > > > > > > 1) Anytime we think we're going to later need to upcall with a context we > > > > > > fork and keep a thread around to do that work. For NFS, that would look > > > > > > like forking a thread for every mount at mount time. The user of this API > > > > > > would be responsible for creating/maintaining the thread and passing it > > > > > > along for work. > > > > > > > > > > Yeah, I don't think that's workable for large numbers of mounts and I > > > > > don't think it's really necessary. > > > > > > > > > > > > > > > > > 2) Specify that a usermodehelper should attempt to use a context rather than > > > > > > the default root context. The context used would be taken from the "init" > > > > > > process of the current pid_namespace. Either that init_process itself could > > > > > > be asked to fork/execve or when the pid_namespace is created a separate > > > > > > helper thread is reserved. > > > > > > > > > > I think this is doable using open()/setns() in a similar way to > > > > > nsenter(1). We can worry about simplifying it once we have a viable > > > > > approach to work from. > > > > > > > > > > The reality is that now user mode helpers are executed within the root > > > > > context of init so I can't see why we can't use the context of init of > > > > > the container for this. > > > > > > > > > > Modifying that along the way with a "struct cred" is probably a good > > > > > idea although it isn't done now for user mode callbacks. The "struct > > > > > cred" of the root init process surely isn't what needs to be used when > > > > > executing in a container so something needs to be done. If we duplicate > > > > > the same behaviour we have now for execution outside of a container then > > > > > we'd use the "struct cred" of the container init process so maybe we do > > > > > know where to get the cred, not sure about that though. > > > > > > > > I'm not following you entirely here. Do you mean that the helper should > > > > probably have the container init's cred stripped off or sanitized? > > > > > > LOL, that's good question. > > > > > > What I think I'm saying is that, when the usermode helper is run we > > > don't want to use root init's credentials but some other credentials > > > relevant to the container, possibly the credentials of the mounter or > > > nfsd process credentials or the container init credentials. > > > > > > In any case they will need to be set to something different and > > > appropriate. I'm not sure how to do that just yet. > > > > > > > Yes, I think we might need to step back and consider that we have a > > number of different use cases here, most of which are currently not > > well served. > > Indeed yes, and what we got was the result I expected from the initial > post of the patches for this, so, I am, ;) > > > > > For instance: module loading clearly needs to be done in the "context" > > of the canonical root init process. That's what call_usermodehelper was > > originally used for so we need to keep that ability intact. > > Not sure that's an issue since the original call_usermodehelper() will > be left in tact and people will need to make a conscious decision to > call what, so far, is call_usermodehelper_ns() to exec within a > container. At least that's the plan. > > > > > OTOH, keyring upcalls probably ought to be done in the context of the > > task that triggered them. Certainly we ought to be spawning them with > > the credentials associated with the keyring. > > Yes, but I'm not really there yet so I can't make sensible comments > about it. > > > > > Today, those tasks not only run in the namespaces, etc of the root init > > process, but also with with root's creds. That's unnecessary and seems > > wrong. I think it's something that ought to be changed (though doing so > > will likely be painful as we'll need to change the upcall programs to > > handle that). > > One thing I believe is that user space programs shouldn't know or need > to to know they are running within a container, I believe this should > have been part of the namespace implementation from the start. > > The creds issue is what I'm trying to understand now since I've not had > to concern myself with these before I'm a bit at sea. It may prove not > doable but then maybe not. > > > > > There are also other questions: > > > > How should we go about spawning the binary given that we might want to > > have it run in a different mount namespace? There are at least two > > options: > > If anything the response to the initial post of these patches showed > that we can't just consider the mount namespace we need to consider the > whole process environment. > > > > > 1) change the mount namespace first and then exec the binary (in effect > > run the binary with the given path from inside the container). This is > > possibly a security hole if an attacker can trick the kernel into > > running a different binary than intended by manipulating namespaces. > > I believe this has to be the way it's done, after sub-process creation > and before the exec, in the user mode helper runner. > > > > > ...or... > > > > 2) find and exec the binary and then change the namespaces afterward. > > This has some potential problems if the program does something like > > try to dlopen libraries after setns(). You could end up with a mismatch > > if the container holds a different set of binaries from the one in the > > root container. > > We really shouldn't need to change the user space binaries, I'd like to > try to avoid that if at all possible. > > When I've referred to setns() here I'm thinking of an in kernel > equivalent not the user space setns() syscall and that wasn't clear, > sorry. > Yeah, I grokked that and I think setting up the process context before exec is the right thing to do, but you still have a similar problem there too... Userland libraries for dynamically linked binaries are loaded by the dynamic loader in userland. If you load the base binary from the root container and then switch to a "child" container, how do you guarantee that the binary has the libraries it needs when it wants to run in the container? Maybe that's a userspace problem ;) -- Jeff Layton