On Fri, 3 May 2024 17:40:54 GMT, jdoylei <d...@openjdk.org> wrote: > > I think it boils down to the same reason as why the fix for JDK-8226919 was > > needed in the first place - a non-root user cannot read the symlinks in > > `/proc/<pid>/ns` for a process running with more privileges even though > > it's run by the same non-root user. > > @slovdahl - In that test case (target JVM process has more privileges), where > is the attach file created? Does jcmd end up writing it to `/tmp`? Or does > `/proc/<pid>/cwd` work? Just curious whether the elevated-privileges scenario > affects the attach file and socket file locations equally.
Yes, the attach file ends up in `/tmp`. Elevated privileges means that at least `/proc/<pid>/root`, `/proc/<pid>/cwd` and `/proc/<pid>/exe` are unreadable. slovdahl@ubuntu2204:/proc/942992$ ls -lh cwd root ls: cannot read symbolic link 'cwd': Permission denied ls: cannot read symbolic link 'root': Permission denied lrwxrwxrwx 1 slovdahl slovdahl 0 maj 6 19:06 cwd lrwxrwxrwx 1 slovdahl slovdahl 0 maj 6 19:06 root > regardless I think the added check for mnt ns comparison "adds value" by > expressing the constraints explicitly vs comparing pid & ns pid Yep, agreed. ------------- PR Comment: https://git.openjdk.org/jdk/pull/19055#issuecomment-2096419600