Andrew Morton [[email protected]] wrote:
|
| (switched to email. Please respond via emailed reply-to-all, not via the
| bugzilla web interface).
|
| On Thu, 11 Dec 2008 08:16:55 -0800 (PST) [email protected]
wrote:
|
| > http://bugzilla.kernel.org/show_bug.cgi?id=12199
| >
| > Summary: /proc/1/exe entry of PID namespace init process links to
| > wrong executable
| > Product: Process Management
| > Version: 2.5
| > KernelVersion: 2.6.27.8
| > Platform: All
| > OS/Version: Linux
| > Tree: Mainline
| > Status: NEW
| > Severity: low
| > Priority: P1
| > Component: Other
| > AssignedTo: [email protected]
| > ReportedBy: [email protected]
| >
| >
| > Latest working kernel version:
| >
| > None known.
| >
| > Earliest failing kernel version:
| >
| > 2.6.25.4, 2.6.27.4 and 2.6.27.8 show this behaviour, but I assume that it
| > exists since 2.6.24 with the introduction of PID namespaces.
Hmm. I am able to repro the behavior with attached test case and with
CLONE_NEWPID removed. Ran this in a chroot shell and it shows complete
path. I tried on Ubuntu 8.04 (2.6.22-15, which has no pid namespace
support).
$ mount /dev/sda3 /tmp/target
$ chroot /tmp/target
$ ./pid_namespace_chroot2
/proc/self/exe is /tmp/target/tmp/pid_namespace_chroot2
set_mm_exe_file() call from flush_old_exec() sets 'mm->exe_file' to
'linux_bprm.file' and proc_exe_link() picks it up from there.
Could this be related how linux_bprm.file is populated after chroot ?
I have not traced that yet.
Sukadev
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/wait.h>
#define CLONE_NEWNS 0x00020000
#define CLONE_NEWPID 0x20000000
/** Compile with "gcc -o pid_namespace_chroot2 pid_namespace_chroot2.c" */
int do_child(void)
{
int status;
char buf[256];
if (mount("none", "/proc", "proc", 0, NULL)) {
perror("mount");
return 1;
}
if (readlink("/proc/self/exe", buf, sizeof(buf)) < 0) {
perror("READLINK");
return 1;
}
printf("/proc/self/exe is %s\n", buf);
if (umount("/proc")) {
perror("umount");
return 1;
}
return 0;
}
int main(void)
{
int status, pid;
void *stack = malloc(getpagesize());
if (!stack) {
perror("malloc");
return 1;
}
pid = clone(do_child, stack + getpagesize(), CLONE_NEWNS, NULL);
if (pid == -1) {
perror("clone");
return 1;
}
if (waitpid(pid, &status, __WALL) < 0) {
perror("waitpid");
return 1;
}
return 0;
}
_______________________________________________
Containers mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/containers
_______________________________________________
Devel mailing list
[email protected]
https://openvz.org/mailman/listinfo/devel