-
Notifications
You must be signed in to change notification settings - Fork 614
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: Vagrant Fedora no vdso gets permission denied when writing to ipc sysctl #1982
Comments
This commit looks related Before that commit the logic is as Lines 195 to 206 in 4cd295b
The destination when write() to these files changes depending ipc namespace of writing process not stick to the file descriptor returned by open(). That commit sticks the destination of write() to file descriptor so now the destination of write() is determined at the time of open(). So the current logic in CRIU is broken. In case of uns test, I don't know if I'm right, is it the restored process in different ipc, user namespace from CRIU process which has CAP_SYS_ADMIN/CAP_CHECKPOINT_RESTORE in its user namespace? If so how can we write to sysctl in this case? As I see, we must open file in restored process ipc namespace as the destination of write() is stick to file descriptor now and the restored process does not have capability. And we can only write to this sysctl if the restored process is in the same ipc namespace with CRIU process but different user namespace (uns test). |
Ah, my mistake, the restored process has capabilities in its user namespace, these capabilities are dropped at the end of restore. So it is easy to write to sysctl, just open and write to them. |
Description
The Vagrant Fedora no vdso CI gets some failed tests in user namespace mode when writing to ipc sysctl (/proc/sys/kernel/{sem_next_id,msg_next_id,shm_next_id})
The text was updated successfully, but these errors were encountered: