[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1455860260.3356.31.camel@themaw.net>
Date: Fri, 19 Feb 2016 13:37:40 +0800
From: Ian Kent <raven@...maw.net>
To: Kamezawa Hiroyuki <kamezawa.hiroyu@...fujitsu.com>,
"Eric W. Biederman" <ebiederm@...ssion.com>
Cc: Oleg Nesterov <oleg@...hat.com>,
Stanislav Kinsbursky <skinsbursky@...allels.com>,
Jeff Layton <jlayton@...hat.com>,
Greg KH <gregkh@...uxfoundation.org>,
linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
linux-nfs@...r.kernel.org, devel@...nvz.org, bfields@...ldses.org,
bharrosh@...asas.com,
Linux Containers <containers@...ts.linux-foundation.org>
Subject: Re: call_usermodehelper in containers
On Fri, 2016-02-19 at 12:08 +0900, Kamezawa Hiroyuki wrote:
> On 2016/02/19 5:45, Eric W. Biederman wrote:
> > Personally I am a fan of the don't be clever and capture a kernel
> > thread
> > approach as it is very easy to see you what if any exploitation
> > opportunities there are. The justifications for something more
> > clever
> > is trickier. Of course we do something that from this perspective
> > would
> > be considered ``clever'' today with kthreadd and user mode helpers.
> >
>
> I read old discussion....let me allow clarification to create a
> helper kernel thread
> to run usermodehelper with using kthreadd.
>
> 0) define a trigger to create an independent usermodehelper
> environment for a container.
> Option A) at creating some namespace (pid, uid, etc...)
> Option B) at creating a new nsproxy
> Option C).at a new systemcall is called or some sysctl,
> make_private_usermode_helper() or some,
>
> It's expected this should be triggered by init process of a
> container with some capability.
> And scope of the effect should be defined. pid namespace ? nsporxy ?
> or new namespace ?
>
> 1) create a helper thread.
> task = kthread_create(kthread_work_fn, ?, ?, "usermodehelper")
> switch task's nsproxy to current.(swtich_task_namespaces())
> switch task's cgroups to current (cgroup_attach_task_all())
> switch task's cred to current.
> copy task's capability from current
> (and any other ?)
> wake_up_process()
>
> And create a link between kthread_wq and container.
Not sure I quite understand this but I thought the difficulty with this
approach previously (even though the approach was very much incomplete)
was knowing that all the "moving parts" would not allow vulnerabilities.
And it looks like this would require a kernel thread for each instance.
So for a thousand containers that each mount an NFS mount that means, at
least, 1000 additional kernel threads. Might be able to sell that, if we
were lucky, but from an system administration POV it's horrible.
There's also the question of existence (aka. lifetime) to deal with
since the thread above needs to be created at a time other than the
usermode helper callback.
What happens for SIGKILL on a container?
> 2) modify call_usermodehelper() to use kthread_worker
> ....
>
> It seems the problem is which object container private user mode
> helper should be tied to.
>
> Regards,
> -Kame
Powered by blists - more mailing lists