Robert Watson wrote:


On Tue, 4 Apr 2006, Peter Jeremy wrote:

On Mon, 2006-Apr-03 16:34:59 +0100, Robert Watson wrote:

(2) The name space model for system v ipc is flat, so while it's desirable
to
allow the administrator in the host environment to monitor and control
   resource use in the jail (for example, delete allocated but unused
segments), doing that requires developing an administrative model for
   it.


The SysV SHM name space is made up of a 32-bit user-selected key which is mapped into a 32-bit (system chosen) identifier, which (on FreeBSD) is made up of a 16-bit pool identifier (in the range 0..shmmni-1) and a 16-bit generation counter.

At the expense of restricting shmmni, the generation counter and JAIL_MAX, it would seem possible to embed prison.pr_id into the shmid and treat pr_id as an (implicit) part of the key - insisting they must match for jailed processes. Since the name space remains the same, ipcs and ipcrm would not be affected and a non-jailed ipcrm could delete jailed IPC by identifier.

On the surface, this approach looks easier than having a distinct name space associated with each prison (as per kern/48471) and has the advantage of allowing non-jailed processes to manage jailed IPC. The disadvantage is restricting the ranges of various counters - though I believe they are overly generous by default.

This doesn't really address the problem of SysV IPC and jails becoming more intimately entwined.


Hmm. This sounds like it might be workable. To make sure I understand your proposal:

- We add a new prison ID field to the in-kernel description of each segment, semaphore, message queue, etc. This is initialized to the prison ID of the
  process creating the object at the time of creation.

- shmget(), et al, will, in addition to matching the key when searching for an existing object, will also attempt to match the prison ID of the object to
  the process.  For the sake of completeness, we will use prison ID 0 for
unjailed processes (or something along those lines). This guarantees that two jails, or even the host and a jail, will never receive an ID already allocated to another jail, and in particular, not an ID for an object from
  another jail with the same key as might be used in the current jail.


what if a host wants to communicate with a jail?
does it make sense?
at teh moment a host ca see into a jail inmany ways.. (filesystem, sockets, process space etc.)


- shmat(), et al, will perform an access control check to confirm that if a
  process is jailed, its prison ID matches that of the object.

Is it necessary, as you suggest, to change the IPC ID name space at all? I assume applications do consistently use shmget() to look up IDs, and that they can't/don't make assumptions about long-term persistence of those mappings across boot (which is effectively what a jail restart is? Is the behavior of IPXSEQ_TO_IPCID() something that has documented or relied on properties, or are we free to perform a mapping from a name (key) to an object (id) in any way we choose?

I guess another change is also needed:

- At jail termination, we GC all resources with the prison ID in question.

This prevents a future jail from turning up with the same ID and seeing old shared memory (etc) segments.

Robert N M Watson
_______________________________________________
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


_______________________________________________
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to