All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 1/2] utils: Add disable_network function
@ 2021-12-22 23:19 Richard Purdie
  2021-12-22 23:19 ` [PATCH 2/2] bitbake-worker: Respect nonetwork task flag Richard Purdie
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Richard Purdie @ 2021-12-22 23:19 UTC (permalink / raw)
  To: bitbake-devel

Add a function which uses the unshare glibc call to disable networking
in the current process. This doesn't work on older distros/kernels
but will on more recent ones so for now we simply ignore the cases we
can't execute on. uid/gid can be passed in externally so this can
work with pseudo/fakeroot contexts.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
---
 lib/bb/utils.py | 31 +++++++++++++++++++++++++++++++
 1 file changed, 31 insertions(+)

diff --git a/lib/bb/utils.py b/lib/bb/utils.py
index d890ea832e..8006f7bd2d 100644
--- a/lib/bb/utils.py
+++ b/lib/bb/utils.py
@@ -26,6 +26,7 @@ import errno
 import signal
 import collections
 import copy
+import ctypes
 from subprocess import getstatusoutput
 from contextlib import contextmanager
 from ctypes import cdll
@@ -1594,6 +1595,36 @@ def set_process_name(name):
     except:
         pass
 
+def disable_network(uid=None, gid=None):
+    """
+    Disable networking in the current process if the kernel supports it, else
+    just return after logging to debug. To do this we need to create a new user
+    namespace, then map back to the original uid/gid.
+    """
+    libc = ctypes.CDLL('libc.so.6')
+
+    # From sched.h
+    # New user namespace
+    CLONE_NEWUSER = 0x10000000
+    # New network namespace
+    CLONE_NEWNET = 0x40000000
+
+    if uid is None:
+        uid = os.getuid()
+    if gid is None:
+        gid = os.getgid()
+
+    ret = libc.unshare(CLONE_NEWNET | CLONE_NEWUSER)
+    if ret != 0:
+        logger.debug("System doesn't suport disabling network without admin privs")
+        return
+    with open("/proc/self/uid_map", "w") as f:
+        f.write("%s %s 1" % (uid, uid))
+    with open("/proc/self/setgroups", "w") as f:
+        f.write("deny")
+    with open("/proc/self/gid_map", "w") as f:
+        f.write("%s %s 1" % (gid, gid))
+
 def export_proxies(d):
     """ export common proxies variables from datastore to environment """
     import os
-- 
2.32.0



^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [PATCH 2/2] bitbake-worker: Respect nonetwork task flag
  2021-12-22 23:19 [PATCH 1/2] utils: Add disable_network function Richard Purdie
@ 2021-12-22 23:19 ` Richard Purdie
  2021-12-23 12:18   ` [bitbake-devel] " Quentin Schulz
  2021-12-23 15:10 ` [bitbake-devel] [PATCH 1/2] utils: Add disable_network function Jose Quaresma
  2023-03-13  4:57 ` ChenQi
  2 siblings, 1 reply; 7+ messages in thread
From: Richard Purdie @ 2021-12-22 23:19 UTC (permalink / raw)
  To: bitbake-devel

Add a "nonetwork" task specific flag which then triggers networking to
be disabled for this task.

This needs to happen before we enter the fakeroot environment of the task
due to the need for the real uid/gid which we save in the parent process.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
---
 bin/bitbake-worker | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/bin/bitbake-worker b/bin/bitbake-worker
index bf96207edc..32d4f58655 100755
--- a/bin/bitbake-worker
+++ b/bin/bitbake-worker
@@ -152,6 +152,10 @@ def fork_off_task(cfg, data, databuilder, workerdata, fn, task, taskname, taskha
     fakeenv = {}
     umask = None
 
+    uid = os.getuid()
+    gid = os.getgid()
+
+
     taskdep = workerdata["taskdeps"][fn]
     if 'umask' in taskdep and taskname in taskdep['umask']:
         umask = taskdep['umask'][taskname]
@@ -257,6 +261,10 @@ def fork_off_task(cfg, data, databuilder, workerdata, fn, task, taskname, taskha
 
                 bb.utils.set_process_name("%s:%s" % (the_data.getVar("PN"), taskname.replace("do_", "")))
 
+                if the_data.getVarFlag(taskname, 'nonetwork', False):
+                    logger.debug("Attempting to disable network")
+                    bb.utils.disable_network(uid, gid)
+
                 # exported_vars() returns a generator which *cannot* be passed to os.environ.update() 
                 # successfully. We also need to unset anything from the environment which shouldn't be there 
                 exports = bb.data.exported_vars(the_data)
-- 
2.32.0



^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [bitbake-devel] [PATCH 2/2] bitbake-worker: Respect nonetwork task flag
  2021-12-22 23:19 ` [PATCH 2/2] bitbake-worker: Respect nonetwork task flag Richard Purdie
@ 2021-12-23 12:18   ` Quentin Schulz
  0 siblings, 0 replies; 7+ messages in thread
From: Quentin Schulz @ 2021-12-23 12:18 UTC (permalink / raw)
  To: bitbake-devel, Richard Purdie

Hi,

On December 23, 2021 12:19:07 AM GMT+01:00, Richard Purdie <richard.purdie@linuxfoundation.org> wrote:
>Add a "nonetwork" task specific flag which then triggers networking to
>be disabled for this task.
>
>This needs to happen before we enter the fakeroot environment of the task
>due to the need for the real uid/gid which we save in the parent process.
>

I'd like to see some docs about this in Bitbake in the variable flags section https://docs.yoctoproject.org/bitbake/bitbake-user-manual/bitbake-user-manual-metadata.html#variable-flags so it's not a hidden feature :)

Just writing this here so we don't forget.

Cheers,
Quentin

>Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
>---
> bin/bitbake-worker | 8 ++++++++
> 1 file changed, 8 insertions(+)
>
>diff --git a/bin/bitbake-worker b/bin/bitbake-worker
>index bf96207edc..32d4f58655 100755
>--- a/bin/bitbake-worker
>+++ b/bin/bitbake-worker
>@@ -152,6 +152,10 @@ def fork_off_task(cfg, data, databuilder, workerdata, fn, task, taskname, taskha
>     fakeenv = {}
>     umask = None
> 
>+    uid = os.getuid()
>+    gid = os.getgid()
>+
>+
>     taskdep = workerdata["taskdeps"][fn]
>     if 'umask' in taskdep and taskname in taskdep['umask']:
>         umask = taskdep['umask'][taskname]
>@@ -257,6 +261,10 @@ def fork_off_task(cfg, data, databuilder, workerdata, fn, task, taskname, taskha
> 
>                 bb.utils.set_process_name("%s:%s" % (the_data.getVar("PN"), taskname.replace("do_", "")))
> 
>+                if the_data.getVarFlag(taskname, 'nonetwork', False):
>+                    logger.debug("Attempting to disable network")
>+                    bb.utils.disable_network(uid, gid)
>+
>                 # exported_vars() returns a generator which *cannot* be passed to os.environ.update() 
>                 # successfully. We also need to unset anything from the environment which shouldn't be there 
>                 exports = bb.data.exported_vars(the_data)


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [bitbake-devel] [PATCH 1/2] utils: Add disable_network function
  2021-12-22 23:19 [PATCH 1/2] utils: Add disable_network function Richard Purdie
  2021-12-22 23:19 ` [PATCH 2/2] bitbake-worker: Respect nonetwork task flag Richard Purdie
@ 2021-12-23 15:10 ` Jose Quaresma
       [not found]   ` <3a672c37d4cd375fed43b59d887c9dcd17c60ee8.camel@linuxfoundation.org>
  2023-03-13  4:57 ` ChenQi
  2 siblings, 1 reply; 7+ messages in thread
From: Jose Quaresma @ 2021-12-23 15:10 UTC (permalink / raw)
  To: Richard Purdie; +Cc: bitbake-devel

[-- Attachment #1: Type: text/plain, Size: 3062 bytes --]

Hi Richard,

First of all, this feature is fantastic.

Richard Purdie <richard.purdie@linuxfoundation.org> escreveu no dia quarta,
22/12/2021 à(s) 23:19:

> Add a function which uses the unshare glibc call to disable networking
> in the current process. This doesn't work on older distros/kernels
> but will on more recent ones so for now we simply ignore the cases we
> can't execute on. uid/gid can be passed in externally so this can
> work with pseudo/fakeroot contexts.
>
> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
> ---
>  lib/bb/utils.py | 31 +++++++++++++++++++++++++++++++
>  1 file changed, 31 insertions(+)
>
> diff --git a/lib/bb/utils.py b/lib/bb/utils.py
> index d890ea832e..8006f7bd2d 100644
> --- a/lib/bb/utils.py
> +++ b/lib/bb/utils.py
> @@ -26,6 +26,7 @@ import errno
>  import signal
>  import collections
>  import copy
> +import ctypes
>  from subprocess import getstatusoutput
>  from contextlib import contextmanager
>  from ctypes import cdll
> @@ -1594,6 +1595,36 @@ def set_process_name(name):
>      except:
>          pass
>
> +def disable_network(uid=None, gid=None):
> +    """
> +    Disable networking in the current process if the kernel supports it,
> else
> +    just return after logging to debug. To do this we need to create a
> new user
> +    namespace, then map back to the original uid/gid.
> +    """
> +    libc = ctypes.CDLL('libc.so.6')
> +
> +    # From sched.h
> +    # New user namespace
> +    CLONE_NEWUSER = 0x10000000
> +    # New network namespace
> +    CLONE_NEWNET = 0x40000000
> +
> +    if uid is None:
> +        uid = os.getuid()
> +    if gid is None:
> +        gid = os.getgid()
> +
> +    ret = libc.unshare(CLONE_NEWNET | CLONE_NEWUSER)
> +    if ret != 0:
> +        logger.debug("System doesn't suport disabling network without
> admin privs")
> +        return
>

try:


> +    with open("/proc/self/uid_map", "w") as f:
> +        f.write("%s %s 1" % (uid, uid))
> +    with open("/proc/self/setgroups", "w") as f:
> +        f.write("deny")
> +    with open("/proc/self/gid_map", "w") as f:
> +        f.write("%s %s 1" % (gid, gid))
>

except:
 print a warning about the fail

Without that it can fail silently if the user doesn't have permission to
write in /proc/self.
In general, if it runs all the steps, the function can return true/false.

Jose

+
>  def export_proxies(d):
>      """ export common proxies variables from datastore to environment """
>      import os
> --
> 2.32.0
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#13199):
> https://lists.openembedded.org/g/bitbake-devel/message/13199
> Mute This Topic: https://lists.openembedded.org/mt/87909296/5052612
> Group Owner: bitbake-devel+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/bitbake-devel/unsub [
> quaresma.jose@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
>

-- 
Best regards,

José Quaresma

[-- Attachment #2: Type: text/html, Size: 4810 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [bitbake-devel] [PATCH 1/2] utils: Add disable_network function
       [not found]   ` <3a672c37d4cd375fed43b59d887c9dcd17c60ee8.camel@linuxfoundation.org>
@ 2022-02-02 12:38     ` Jose Quaresma
       [not found]       ` <1699ebd54f3414641b7ff78e1cec2bc546b658cf.camel@linuxfoundation.org>
  0 siblings, 1 reply; 7+ messages in thread
From: Jose Quaresma @ 2022-02-02 12:38 UTC (permalink / raw)
  To: Richard Purdie; +Cc: bitbake-devel

[-- Attachment #1: Type: text/plain, Size: 2461 bytes --]

Hi Richard,

I think that the usage of the unshare system call can replace the use of
pseudo on bitbake.
If we map the new user namespace to the superuser we can do what is
bean done nowadays
inside the pseudo or not ?

       *-r*, *--map-root-user*
           Run the program only after the current effective user and
           group IDs have been mapped to the superuser UID and GID in
           the newly created user namespace. This makes it possible to
           conveniently gain capabilities needed to manage various
           aspects of the newly created namespaces (such as configuring
           interfaces in the network namespace or mounting filesystems
           in the mount namespace) even when run unprivileged. As a mere
           convenience feature, it does not support more sophisticated
           use cases, such as mapping multiple ranges of UIDs and GIDs.
           This option implies *--setgroups=deny *and *--user*. This option
           is equivalent to *--map-user=0 --map-group=0*.

https://man7.org/linux/man-pages/man1/unshare.1.html

Best regards,
Jose

Richard Purdie <richard.purdie@linuxfoundation.org> escreveu no dia sexta,
24/12/2021 à(s) 15:57:

> On Thu, 2021-12-23 at 15:10 +0000, Jose Quaresma wrote:
> > Hi Richard,
> >
> > First of all, this feature is fantastic.
>
> I'm certainly happy we can now do this, at least for some systems (and the
> situation should improve in the future),
>
> >
> > Richard Purdie <richard.purdie@linuxfoundation.org> escreveu no dia
> quarta,
> > 22/12/2021 à(s) 23:19:
> > >
> >
> >
> > try:
> >
> > > +    with open("/proc/self/uid_map", "w") as f:
> > > +        f.write("%s %s 1" % (uid, uid))
> > > +    with open("/proc/self/setgroups", "w") as f:
> > > +        f.write("deny")
> > > +    with open("/proc/self/gid_map", "w") as f:
> > > +        f.write("%s %s 1" % (gid, gid))
> > >
> >
> >
> > except:
> >  print a warning about the fail
> >
> > Without that it can fail silently if the user doesn't have permission to
> write
> > in /proc/self.
> > In general, if it runs all the steps, the function can return true/false.
>
> The trouble is there are a set of older distros where this definitely
> won't work
> and we can't really afford to print warnings on those. Not sure what the
> best
> way forward is for that...
>
> Cheers,
>
> Richard
>
>

-- 
Best regards,

José Quaresma

[-- Attachment #2: Type: text/html, Size: 3689 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [bitbake-devel] [PATCH 1/2] utils: Add disable_network function
       [not found]       ` <1699ebd54f3414641b7ff78e1cec2bc546b658cf.camel@linuxfoundation.org>
@ 2022-02-02 14:59         ` Jose Quaresma
  0 siblings, 0 replies; 7+ messages in thread
From: Jose Quaresma @ 2022-02-02 14:59 UTC (permalink / raw)
  To: Richard Purdie; +Cc: bitbake-devel

[-- Attachment #1: Type: text/plain, Size: 1956 bytes --]

Richard Purdie <richard.purdie@linuxfoundation.org> escreveu no dia quarta,
2/02/2022 à(s) 13:43:

> On Wed, 2022-02-02 at 12:38 +0000, Jose Quaresma wrote:
> > Hi Richard,
> >
> > I think that the usage of the unshare system call can replace the use of
> > pseudo on bitbake.
> > If we map the new user namespace to the superuser we can do what is
> bean done
> > nowadays
> > inside the pseudo or not ?
> >        -r, --map-root-user
> >            Run the program only after the current effective user and
> >            group IDs have been mapped to the superuser UID and GID in
> >            the newly created user namespace. This makes it possible to
> >            conveniently gain capabilities needed to manage various
> >            aspects of the newly created namespaces (such as configuring
> >            interfaces in the network namespace or mounting filesystems
> >            in the mount namespace) even when run unprivileged. As a mere
> >            convenience feature, it does not support more sophisticated
> >            use cases, such as mapping multiple ranges of UIDs and GIDs.
> >            This option implies --setgroups=deny and --user. This option
> >            is equivalent to --map-user=0 --map-group=0.
> > https://man7.org/linux/man-pages/man1/unshare.1.html
> >
>
> I wondered about that and I would love for it to be true however it isn't
> that
> simple.
>
> With pseudo we emulate multiple different users and a separate
> passwd/group file
> with those users in it. The unshare call would map the current user to
> root but
> it doesn't give us other user IDs or groups to chown/chgrp files to, at
> least as
> I understand it.
>

It was also sounding too simple to be true.
I will try to better understand this part of the chown/chgrp usage on
pseudo.
Thank you for the clarification.


>
> Cheers,
>
> Richard
>
>

-- 
Best regards,

José Quaresma

[-- Attachment #2: Type: text/html, Size: 2932 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [bitbake-devel] [PATCH 1/2] utils: Add disable_network function
  2021-12-22 23:19 [PATCH 1/2] utils: Add disable_network function Richard Purdie
  2021-12-22 23:19 ` [PATCH 2/2] bitbake-worker: Respect nonetwork task flag Richard Purdie
  2021-12-23 15:10 ` [bitbake-devel] [PATCH 1/2] utils: Add disable_network function Jose Quaresma
@ 2023-03-13  4:57 ` ChenQi
  2 siblings, 0 replies; 7+ messages in thread
From: ChenQi @ 2023-03-13  4:57 UTC (permalink / raw)
  To: Richard Purdie, bitbake-devel

Hi Richard,

This might be a dummy question, but I'm wondering which kernels/distros 
could support it.
I tried the codes on poky target with linux-yocto 6.1.14, and it failed 
for a non-root user.

This manual, https://man7.org/linux/man-pages/man2/unshare.2.html, tells 
me that CLONE_NEWNET requires CAP_SYS_ADMIN. And looking at the 
netns_install function in net/core/net_namespace.c, it does seem to be 
checking CAP_SYS_ADMIN.

Regards,
Qi

On 12/23/21 07:19, Richard Purdie wrote:
> Add a function which uses the unshare glibc call to disable networking
> in the current process. This doesn't work on older distros/kernels
> but will on more recent ones so for now we simply ignore the cases we
> can't execute on. uid/gid can be passed in externally so this can
> work with pseudo/fakeroot contexts.
>
> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
> ---
>   lib/bb/utils.py | 31 +++++++++++++++++++++++++++++++
>   1 file changed, 31 insertions(+)
>
> diff --git a/lib/bb/utils.py b/lib/bb/utils.py
> index d890ea832e..8006f7bd2d 100644
> --- a/lib/bb/utils.py
> +++ b/lib/bb/utils.py
> @@ -26,6 +26,7 @@ import errno
>   import signal
>   import collections
>   import copy
> +import ctypes
>   from subprocess import getstatusoutput
>   from contextlib import contextmanager
>   from ctypes import cdll
> @@ -1594,6 +1595,36 @@ def set_process_name(name):
>       except:
>           pass
>   
> +def disable_network(uid=None, gid=None):
> +    """
> +    Disable networking in the current process if the kernel supports it, else
> +    just return after logging to debug. To do this we need to create a new user
> +    namespace, then map back to the original uid/gid.
> +    """
> +    libc = ctypes.CDLL('libc.so.6')
> +
> +    # From sched.h
> +    # New user namespace
> +    CLONE_NEWUSER = 0x10000000
> +    # New network namespace
> +    CLONE_NEWNET = 0x40000000
> +
> +    if uid is None:
> +        uid = os.getuid()
> +    if gid is None:
> +        gid = os.getgid()
> +
> +    ret = libc.unshare(CLONE_NEWNET | CLONE_NEWUSER)
> +    if ret != 0:
> +        logger.debug("System doesn't suport disabling network without admin privs")
> +        return
> +    with open("/proc/self/uid_map", "w") as f:
> +        f.write("%s %s 1" % (uid, uid))
> +    with open("/proc/self/setgroups", "w") as f:
> +        f.write("deny")
> +    with open("/proc/self/gid_map", "w") as f:
> +        f.write("%s %s 1" % (gid, gid))
> +
>   def export_proxies(d):
>       """ export common proxies variables from datastore to environment """
>       import os
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#13199): https://lists.openembedded.org/g/bitbake-devel/message/13199
> Mute This Topic: https://lists.openembedded.org/mt/87909296/3618072
> Group Owner: bitbake-devel+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/bitbake-devel/unsub [Qi.Chen@windriver.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>



^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2023-03-13  4:57 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-12-22 23:19 [PATCH 1/2] utils: Add disable_network function Richard Purdie
2021-12-22 23:19 ` [PATCH 2/2] bitbake-worker: Respect nonetwork task flag Richard Purdie
2021-12-23 12:18   ` [bitbake-devel] " Quentin Schulz
2021-12-23 15:10 ` [bitbake-devel] [PATCH 1/2] utils: Add disable_network function Jose Quaresma
     [not found]   ` <3a672c37d4cd375fed43b59d887c9dcd17c60ee8.camel@linuxfoundation.org>
2022-02-02 12:38     ` Jose Quaresma
     [not found]       ` <1699ebd54f3414641b7ff78e1cec2bc546b658cf.camel@linuxfoundation.org>
2022-02-02 14:59         ` Jose Quaresma
2023-03-13  4:57 ` ChenQi

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.