Package: base-passwd
Version: 3.5.52build1
Severity: normal
X-Debbugs-Cc: [email protected]

Dear Maintainer,

   * What led up to the situation?
   The transition of /dev/dri/renderD* from the video to the render
   group in SystemD has led to issues due to the lack of a fixed GID for
   render. This has impacted various projects and forced the community
   to adopt workarounds some workarounds are potentially security hazard
   (e.g. enabling privilege mode or root access to mitigate this issue)
   This impacts Docker users and VM users the most.

   Reference commit ID:
   github.com/systemd/systemd/commit/4e15a7343cb389e97f3eb4f49699161862d8b8b2

   Some examples of issues around this:
   https://github.com/blakeblackshear/frigate/issues/7640
   
https://unix.stackexchange.com/questions/747523/docker-permissions-issue-accessing-dev-dri-device
   https://github.com/linuxserver/docker-plex/issues/211
   
https://support.xilinx.com/s/question/0D52E00006mfsHaSAI/permission-denied-when-running-hardware
   https://github.com/jellyfin/jellyfin/issues/9229

   As `render` group is crucial for GPUs as render group is now associated
   with `/dev/dri/renderD*` it means that currently this GPU GID is randomly
   set.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

   Existing community's approach is either to set in root mode, privilege
   mode, or if they have access to the host, it would be to run 
   --group-add=$(stat -c "%g" /dev/dri/render*) on the host to launch
   Docker but this is assuming host access is provided.

   * What was the outcome of this action?

   It does work but with lots of compromise either from security pov or
   limited access to host or requiring external scripts to figure out
   the GID of `render` group for GPU access.

   * What outcome did you expect instead?

   Before this change from SystemD, `/dev/dri/renderD*` used to be under
   `video` group which is fixed and this allowed users to use the GPU
   without experience permission denied issues. Having a fixed GID for
   `render` group would have the same effect and would allow
   GPU based applications to avoid running in root or privileged mode
   or requiring to run on host.

-- System Information:
Debian Release: bookworm/sid
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.2.0-37-generic (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages base-passwd depends on:
ii  libc6              2.35-0ubuntu3.5
ii  libdebconfclient0  0.261ubuntu1

Versions of packages base-passwd recommends:
ii  debconf [debconf-2.0]  1.5.79ubuntu1

base-passwd suggests no packages.

-- debconf information excluded

Reply via email to