Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
2f1a5e77
Unverified
Commit
2f1a5e77
authored
Mar 27, 2020
by
Christian Brauner
Committed by
Stéphane Graber
Mar 27, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
conf: simplify userns_exec_minimal()
Signed-off-by:
Christian Brauner
<
christian.brauner@ubuntu.com
>
parent
f95c658c
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
39 additions
and
39 deletions
+39
-39
cgfsng.c
src/lxc/cgroups/cgfsng.c
+0
-19
conf.c
src/lxc/conf.c
+39
-20
No files found.
src/lxc/cgroups/cgfsng.c
View file @
2f1a5e77
...
@@ -2123,29 +2123,10 @@ struct userns_exec_unified_attach_data {
...
@@ -2123,29 +2123,10 @@ struct userns_exec_unified_attach_data {
static
int
cgroup_unified_attach_wrapper
(
void
*
data
)
static
int
cgroup_unified_attach_wrapper
(
void
*
data
)
{
{
struct
userns_exec_unified_attach_data
*
args
=
data
;
struct
userns_exec_unified_attach_data
*
args
=
data
;
uid_t
nsuid
;
gid_t
nsgid
;
int
ret
;
if
(
!
args
->
conf
||
args
->
unified_fd
<
0
||
args
->
pid
<=
0
)
if
(
!
args
->
conf
||
args
->
unified_fd
<
0
||
args
->
pid
<=
0
)
return
ret_errno
(
EINVAL
);
return
ret_errno
(
EINVAL
);
if
(
!
lxc_setgroups
(
0
,
NULL
)
&&
errno
!=
EPERM
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to setgroups(0, NULL)"
);
nsuid
=
(
args
->
conf
->
root_nsuid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_uid
;
nsgid
=
(
args
->
conf
->
root_nsgid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_gid
;
ret
=
setresgid
(
nsgid
,
nsgid
,
nsgid
);
if
(
ret
<
0
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to setresgid(%d, %d, %d)"
,
(
int
)
nsgid
,
(
int
)
nsgid
,
(
int
)
nsgid
);
ret
=
setresuid
(
nsuid
,
nsuid
,
nsuid
);
if
(
ret
<
0
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to setresuid(%d, %d, %d)"
,
(
int
)
nsuid
,
(
int
)
nsuid
,
(
int
)
nsuid
);
return
cgroup_attach_leaf
(
args
->
conf
,
args
->
unified_fd
,
args
->
pid
);
return
cgroup_attach_leaf
(
args
->
conf
,
args
->
unified_fd
,
args
->
pid
);
}
}
...
...
src/lxc/conf.c
View file @
2f1a5e77
...
@@ -3940,7 +3940,8 @@ static struct id_map *mapped_hostid_add(const struct lxc_conf *conf, uid_t id,
...
@@ -3940,7 +3940,8 @@ static struct id_map *mapped_hostid_add(const struct lxc_conf *conf, uid_t id,
return
move_ptr
(
entry
);
return
move_ptr
(
entry
);
}
}
static
struct
lxc_list
*
get_minimal_idmap
(
const
struct
lxc_conf
*
conf
)
static
struct
lxc_list
*
get_minimal_idmap
(
const
struct
lxc_conf
*
conf
,
uid_t
*
resuid
,
gid_t
*
resgid
)
{
{
__do_free
struct
id_map
*
container_root_uid
=
NULL
,
__do_free
struct
id_map
*
container_root_uid
=
NULL
,
*
container_root_gid
=
NULL
,
*
container_root_gid
=
NULL
,
...
@@ -4029,7 +4030,12 @@ static struct lxc_list *get_minimal_idmap(const struct lxc_conf *conf)
...
@@ -4029,7 +4030,12 @@ static struct lxc_list *get_minimal_idmap(const struct lxc_conf *conf)
/* idmap will now keep track of that memory. */
/* idmap will now keep track of that memory. */
move_ptr
(
host_gid_map
);
move_ptr
(
host_gid_map
);
TRACE
(
"Allocated minimal idmapping"
);
TRACE
(
"Allocated minimal idmapping for ns uid %d and ns gid %d"
,
nsuid
,
nsgid
);
if
(
resuid
)
*
resuid
=
nsuid
;
if
(
resgid
)
*
resgid
=
nsgid
;
return
move_ptr
(
idmap
);
return
move_ptr
(
idmap
);
}
}
...
@@ -4058,7 +4064,7 @@ int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
...
@@ -4058,7 +4064,7 @@ int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
if
(
!
conf
)
if
(
!
conf
)
return
-
EINVAL
;
return
-
EINVAL
;
idmap
=
get_minimal_idmap
(
conf
);
idmap
=
get_minimal_idmap
(
conf
,
NULL
,
NULL
);
if
(
!
idmap
)
if
(
!
idmap
)
return
ret_errno
(
ENOENT
);
return
ret_errno
(
ENOENT
);
...
@@ -4123,16 +4129,17 @@ on_error:
...
@@ -4123,16 +4129,17 @@ on_error:
int
userns_exec_minimal
(
const
struct
lxc_conf
*
conf
,
int
(
*
fn
)(
void
*
),
void
*
data
)
int
userns_exec_minimal
(
const
struct
lxc_conf
*
conf
,
int
(
*
fn
)(
void
*
),
void
*
data
)
{
{
call_cleaner
(
lxc_free_idmap
)
struct
lxc_list
*
idmap
=
NULL
;
call_cleaner
(
lxc_free_idmap
)
struct
lxc_list
*
idmap
=
NULL
;
int
ret
=
-
1
,
status
=
-
1
;
uid_t
resuid
=
LXC_INVALID_UID
;
ssize_t
rret
;
gid_t
resgid
=
LXC_INVALID_GID
;
char
c
=
'1'
;
char
c
=
'1'
;
ssize_t
ret
;
pid_t
pid
;
pid_t
pid
;
int
sock_fds
[
2
];
int
sock_fds
[
2
];
if
(
!
conf
)
if
(
!
conf
||
!
fn
||
!
data
)
return
-
EINVAL
;
return
ret_errno
(
EINVAL
)
;
idmap
=
get_minimal_idmap
(
conf
);
idmap
=
get_minimal_idmap
(
conf
,
&
resuid
,
&
resgid
);
if
(
!
idmap
)
if
(
!
idmap
)
return
ret_errno
(
ENOENT
);
return
ret_errno
(
ENOENT
);
...
@@ -4142,7 +4149,7 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
...
@@ -4142,7 +4149,7 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
pid
=
fork
();
pid
=
fork
();
if
(
pid
<
0
)
{
if
(
pid
<
0
)
{
ERROR
(
"Failed to clone process in new user namespace
"
);
SYSERROR
(
"Failed to create new process
"
);
goto
on_error
;
goto
on_error
;
}
}
...
@@ -4150,11 +4157,13 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
...
@@ -4150,11 +4157,13 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
close_prot_errno_disarm
(
sock_fds
[
1
]);
close_prot_errno_disarm
(
sock_fds
[
1
]);
ret
=
unshare
(
CLONE_NEWUSER
);
ret
=
unshare
(
CLONE_NEWUSER
);
if
(
ret
<
0
)
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to unshare new user namespace"
);
_exit
(
EXIT_FAILURE
);
_exit
(
EXIT_FAILURE
);
}
r
r
et
=
lxc_write_nointr
(
sock_fds
[
0
],
&
c
,
1
);
ret
=
lxc_write_nointr
(
sock_fds
[
0
],
&
c
,
1
);
if
(
r
r
et
!=
1
)
if
(
ret
!=
1
)
_exit
(
EXIT_FAILURE
);
_exit
(
EXIT_FAILURE
);
ret
=
lxc_read_nointr
(
sock_fds
[
0
],
&
c
,
1
);
ret
=
lxc_read_nointr
(
sock_fds
[
0
],
&
c
,
1
);
...
@@ -4166,12 +4175,25 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
...
@@ -4166,12 +4175,25 @@ int userns_exec_minimal(const struct lxc_conf *conf, int (*fn)(void *), void *da
if
(
!
lxc_setgroups
(
0
,
NULL
)
&&
errno
!=
EPERM
)
if
(
!
lxc_setgroups
(
0
,
NULL
)
&&
errno
!=
EPERM
)
_exit
(
EXIT_FAILURE
);
_exit
(
EXIT_FAILURE
);
if
(
!
lxc_switch_uid_gid
(
0
,
0
))
ret
=
setresgid
(
resgid
,
resgid
,
resgid
);
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to setresgid(%d, %d, %d)"
,
resgid
,
resgid
,
resgid
);
_exit
(
EXIT_FAILURE
);
_exit
(
EXIT_FAILURE
);
}
ret
=
setresuid
(
resuid
,
resuid
,
resuid
);
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to setresuid(%d, %d, %d)"
,
resuid
,
resuid
,
resuid
);
_exit
(
EXIT_FAILURE
);
}
ret
=
fn
(
data
);
ret
=
fn
(
data
);
if
(
ret
)
if
(
ret
)
{
SYSERROR
(
"Running function in new user namespace failed"
);
_exit
(
EXIT_FAILURE
);
_exit
(
EXIT_FAILURE
);
}
_exit
(
EXIT_SUCCESS
);
_exit
(
EXIT_SUCCESS
);
}
}
...
@@ -4215,13 +4237,10 @@ on_error:
...
@@ -4215,13 +4237,10 @@ on_error:
close_prot_errno_disarm
(
sock_fds
[
1
]);
close_prot_errno_disarm
(
sock_fds
[
1
]);
/* Wait for child to finish. */
/* Wait for child to finish. */
if
(
pid
>
0
)
if
(
pid
<
0
)
status
=
wait_for_pid
(
pid
);
return
-
1
;
if
(
status
<
0
)
ret
=
-
1
;
return
ret
;
return
wait_for_pid
(
pid
)
;
}
}
int
userns_exec_full
(
struct
lxc_conf
*
conf
,
int
(
*
fn
)(
void
*
),
void
*
data
,
int
userns_exec_full
(
struct
lxc_conf
*
conf
,
int
(
*
fn
)(
void
*
),
void
*
data
,
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment