Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
d4a5002b
Unverified
Commit
d4a5002b
authored
Mar 27, 2020
by
Stéphane Graber
Committed by
GitHub
Mar 27, 2020
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #3330 from brauner/2020-03-27/fixes
conf: rework and fix leak in userns_exec_1()
parents
8c6a7ee4
32908bfd
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
48 additions
and
46 deletions
+48
-46
cgfsng.c
src/lxc/cgroups/cgfsng.c
+18
-11
commands.c
src/lxc/commands.c
+1
-1
conf.c
src/lxc/conf.c
+29
-34
No files found.
src/lxc/cgroups/cgfsng.c
View file @
d4a5002b
...
...
@@ -2124,8 +2124,8 @@ struct userns_exec_unified_attach_data {
static
int
cgroup_unified_attach_wrapper
(
void
*
data
)
{
struct
userns_exec_unified_attach_data
*
args
=
data
;
uid_t
nsuid
=
(
args
->
conf
->
root_nsuid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_uid
;
gid_t
nsgid
=
(
args
->
conf
->
root_nsgid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_gid
;
uid_t
nsuid
;
gid_t
nsgid
;
int
ret
;
if
(
!
args
->
conf
||
args
->
unified_fd
<
0
||
args
->
pid
<=
0
)
...
...
@@ -2134,6 +2134,9 @@ static int cgroup_unified_attach_wrapper(void *data)
if
(
!
lxc_setgroups
(
0
,
NULL
)
&&
errno
!=
EPERM
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to setgroups(0, NULL)"
);
nsuid
=
(
args
->
conf
->
root_nsuid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_uid
;
nsgid
=
(
args
->
conf
->
root_nsgid_map
!=
NULL
)
?
0
:
args
->
conf
->
init_gid
;
ret
=
setresgid
(
nsgid
,
nsgid
,
nsgid
);
if
(
ret
<
0
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to setresgid(%d, %d, %d)"
,
...
...
@@ -2191,23 +2194,27 @@ static int __cg_unified_attach(const struct hierarchy *h,
const
char
*
controller
)
{
__do_close
int
unified_fd
=
-
EBADF
;
__do_free
char
*
path
=
NULL
,
*
cgroup
=
NULL
;
int
ret
;
if
(
!
conf
||
!
name
||
!
lxcpath
||
pid
<=
0
)
return
ret_errno
(
EINVAL
);
ret
=
cgroup_attach
(
conf
,
name
,
lxcpath
,
pid
);
if
(
ret
<
0
)
{
__do_free
char
*
path
=
NULL
,
*
cgroup
=
NULL
;
if
(
ret
==
0
)
return
log_trace
(
0
,
"Attached to unified cgroup via command handler"
);
if
(
ret
!=
-
EBADF
)
return
log_error_errno
(
ret
,
errno
,
"Failed to attach to unified cgroup"
);
cgroup
=
lxc_cmd_get_cgroup_path
(
name
,
lxcpath
,
controller
);
/* not running */
if
(
!
cgroup
)
return
0
;
/* Fall back to retrieving the path for the unified cgroup. */
cgroup
=
lxc_cmd_get_cgroup_path
(
name
,
lxcpath
,
controller
);
/* not running */
if
(
!
cgroup
)
return
0
;
path
=
must_make_path
(
h
->
mountpoint
,
cgroup
,
NULL
);
unified_fd
=
open
(
path
,
O_DIRECTORY
|
O_RDONLY
|
O_CLOEXEC
);
}
path
=
must_make_path
(
h
->
mountpoint
,
cgroup
,
NULL
);
unified_fd
=
open
(
path
,
O_PATH
|
O_DIRECTORY
|
O_CLOEXEC
);
if
(
unified_fd
<
0
)
return
ret_errno
(
EBADF
);
...
...
src/lxc/commands.c
View file @
d4a5002b
...
...
@@ -1328,7 +1328,7 @@ int lxc_cmd_get_cgroup2_fd(const char *name, const char *lxcpath)
return
-
1
;
if
(
cmd
.
rsp
.
ret
<
0
)
return
log_debug_errno
(
-
1
,
errno
,
"Failed to receive cgroup2 fd"
);
return
log_debug_errno
(
cmd
.
rsp
.
ret
,
-
cmd
.
rsp
.
ret
,
"Failed to receive cgroup2 fd"
);
return
PTR_TO_INT
(
cmd
.
rsp
.
data
);
}
...
...
src/lxc/conf.c
View file @
d4a5002b
...
...
@@ -3496,6 +3496,7 @@ static int lxc_free_idmap(struct lxc_list *id_map)
return
0
;
}
define_cleanup_function
(
struct
lxc_list
*
,
lxc_free_idmap
);
int
lxc_clear_idmaps
(
struct
lxc_conf
*
c
)
{
...
...
@@ -3846,19 +3847,18 @@ struct userns_fn_data {
static
int
run_userns_fn
(
void
*
data
)
{
struct
userns_fn_data
*
d
=
data
;
int
ret
;
char
c
;
struct
userns_fn_data
*
d
=
data
;
/* Close write end of the pipe. */
close
(
d
->
p
[
1
]);
close_prot_errno_disarm
(
d
->
p
[
1
]);
/* Wait for parent to finish establishing a new mapping in the user
/*
* Wait for parent to finish establishing a new mapping in the user
* namespace we are executing in.
*/
ret
=
lxc_read_nointr
(
d
->
p
[
0
],
&
c
,
1
);
/* Close read end of the pipe. */
close
(
d
->
p
[
0
]);
close_prot_errno_disarm
(
d
->
p
[
0
]);
if
(
ret
!=
1
)
return
-
1
;
...
...
@@ -4033,7 +4033,8 @@ static struct lxc_list *get_minimal_idmap(const struct lxc_conf *conf)
return
move_ptr
(
idmap
);
}
/* Run a function in a new user namespace.
/*
* Run a function in a new user namespace.
* The caller's euid/egid will be mapped if it is not already.
* Afaict, userns_exec_1() is only used to operate based on privileges for the
* user's own {g,u}id on the host and for the container root's unmapped {g,u}id.
...
...
@@ -4047,30 +4048,29 @@ static struct lxc_list *get_minimal_idmap(const struct lxc_conf *conf)
int
userns_exec_1
(
const
struct
lxc_conf
*
conf
,
int
(
*
fn
)(
void
*
),
void
*
data
,
const
char
*
fn_name
)
{
pid_t
pid
;
int
p
[
2
];
struct
userns_fn_data
d
;
struct
lxc_list
*
idmap
;
call_cleaner
(
lxc_free_idmap
)
struct
lxc_list
*
idmap
=
NULL
;
int
ret
=
-
1
,
status
=
-
1
;
char
c
=
'1'
;
pid_t
pid
;
int
pipe_fds
[
2
];
struct
userns_fn_data
d
;
if
(
!
conf
)
return
-
EINVAL
;
idmap
=
get_minimal_idmap
(
conf
);
if
(
!
idmap
)
return
-
1
;
return
ret_errno
(
ENOENT
)
;
ret
=
pipe2
(
p
,
O_CLOEXEC
);
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to create pipe"
);
return
-
1
;
}
d
.
fn
=
fn
;
d
.
fn_name
=
fn_name
;
d
.
arg
=
data
;
d
.
p
[
0
]
=
p
[
0
];
d
.
p
[
1
]
=
p
[
1
];
ret
=
pipe2
(
pipe_fds
,
O_CLOEXEC
);
if
(
ret
<
0
)
return
-
errno
;
d
.
fn
=
fn
;
d
.
fn_name
=
fn_name
;
d
.
arg
=
data
;
d
.
p
[
0
]
=
pipe_fds
[
0
];
d
.
p
[
1
]
=
pipe_fds
[
1
];
/* Clone child in new user namespace. */
pid
=
lxc_raw_clone_cb
(
run_userns_fn
,
&
d
,
CLONE_NEWUSER
,
NULL
);
...
...
@@ -4079,21 +4079,17 @@ int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
goto
on_error
;
}
close
(
p
[
0
]);
p
[
0
]
=
-
1
;
close_prot_errno_disarm
(
pipe_fds
[
0
]);
if
(
lxc_log_get_level
()
==
LXC_LOG_LEVEL_TRACE
||
conf
->
loglevel
==
LXC_LOG_LEVEL_TRACE
)
{
struct
id_map
*
map
;
struct
lxc_list
*
it
;
lxc_list_for_each
(
it
,
idmap
)
{
lxc_list_for_each
(
it
,
idmap
)
{
map
=
it
->
elem
;
TRACE
(
"Establishing %cid mapping for
\"
%d
\"
in new "
"user namespace: nsuid %lu - hostid %lu - range "
"%lu"
,
(
map
->
idtype
==
ID_TYPE_UID
)
?
'u'
:
'g'
,
pid
,
map
->
nsid
,
map
->
hostid
,
map
->
range
);
TRACE
(
"Establishing %cid mapping for
\"
%d
\"
in new user namespace: nsuid %lu - hostid %lu - range %lu"
,
(
map
->
idtype
==
ID_TYPE_UID
)
?
'u'
:
'g'
,
pid
,
map
->
nsid
,
map
->
hostid
,
map
->
range
);
}
}
...
...
@@ -4105,15 +4101,14 @@ int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
}
/* Tell child to proceed. */
if
(
lxc_write_nointr
(
p
[
1
],
&
c
,
1
)
!=
1
)
{
if
(
lxc_write_nointr
(
p
ipe_fds
[
1
],
&
c
,
1
)
!=
1
)
{
SYSERROR
(
"Failed telling child process
\"
%d
\"
to proceed"
,
pid
);
goto
on_error
;
}
on_error:
if
(
p
[
0
]
!=
-
1
)
close
(
p
[
0
]);
close
(
p
[
1
]);
close_prot_errno_disarm
(
pipe_fds
[
0
]);
close_prot_errno_disarm
(
pipe_fds
[
1
]);
/* Wait for child to finish. */
if
(
pid
>
0
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment