On 2013/03/11 14:26, Gao feng wrote: > This patch introduces new helper function > virLXCControllerSetupUserns, in this function, > we set the files uid_map and gid_map of process > libvirt_lxc. >
Oops,not libvirt_lxc, it's the init task of container. > lxcContainerSetUserns is used for creating cred for > tasks running in container. Since after setuid/setgid, > we may be a new user. This patch calls lxcContainerSetUserns > at first to make sure the new created files belong to > right user. > > Signed-off-by: Gao feng <gaof...@cn.fujitsu.com> > --- > src/lxc/lxc_container.c | 55 ++++++++++++++++++++++++++++++---------- > src/lxc/lxc_controller.c | 66 > ++++++++++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 107 insertions(+), 14 deletions(-) > > diff --git a/src/lxc/lxc_container.c b/src/lxc/lxc_container.c > index 1d7bc1e..5c66ae3 100644 > --- a/src/lxc/lxc_container.c > +++ b/src/lxc/lxc_container.c > @@ -329,6 +329,29 @@ int lxcContainerWaitForContinue(int control) > > > /** > + * lxcContainerSetUserns: > + * > + * This function calls setuid and setgid to create proper > + * cred for tasks running in container. > + * > + * Returns 0 on success or -1 in case of error > + */ > +static int lxcContainerSetUserns(virDomainDefPtr def) > +{ > + if (def->os.userns != VIR_DOMAIN_USER_NS_ENABLED) > + return 0; > + > + if (virSetUIDGID(def->os.uidmap.first, > + def->os.gidmap.first) < 0) { > + virReportSystemError(errno, "%s", > + _("setuid or setgid failed")); > + return -1; > + } > + > + return 0; > +} > + > +/** > * lxcContainerRenameAndEnableInterfaces: > * @nveths: number of interfaces > * @veths: interface names > @@ -2221,6 +2244,24 @@ static int lxcContainerChild(void *data) > } > } > > + if (!virFileExists(vmDef->os.init)) { > + virReportSystemError(errno, > + _("cannot find init path '%s' relative to container > root"), > + vmDef->os.init); > + goto cleanup; > + } > + > + /* Wait for interface devices to show up */ > + if (lxcContainerWaitForContinue(argv->monitor) < 0) { > + virReportSystemError(errno, "%s", > + _("Failed to read the container continue > message")); > + goto cleanup; > + } > + VIR_DEBUG("Received container continue message"); > + > + if (lxcContainerSetUserns(vmDef) < 0) > + goto cleanup; > + > VIR_DEBUG("Container TTY path: %s", ttyPath); > > ttyfd = open(ttyPath, O_RDWR|O_NOCTTY); > @@ -2236,20 +2277,6 @@ static int lxcContainerChild(void *data) > argv->securityDriver) < 0) > goto cleanup; > > - if (!virFileExists(vmDef->os.init)) { > - virReportSystemError(errno, > - _("cannot find init path '%s' relative to container > root"), > - vmDef->os.init); > - goto cleanup; > - } > - > - /* Wait for interface devices to show up */ > - if (lxcContainerWaitForContinue(argv->monitor) < 0) { > - virReportSystemError(errno, "%s", > - _("Failed to read the container continue > message")); > - goto cleanup; > - } > - VIR_DEBUG("Received container continue message"); > > /* rename and enable interfaces */ > if (lxcContainerRenameAndEnableInterfaces(!!(vmDef->features & > diff --git a/src/lxc/lxc_controller.c b/src/lxc/lxc_controller.c > index 15aa334..f17142f 100644 > --- a/src/lxc/lxc_controller.c > +++ b/src/lxc/lxc_controller.c > @@ -1028,6 +1028,69 @@ cleanup2: > } > > > +/** > + * virLXCControllerSetupUserns > + * > + * Set proc files for user namespace > + * > + * Returns 0 on success or -1 in case of error > + */ > +static int virLXCControllerSetupUserns(virLXCControllerPtr ctrl) > +{ > + char *uid_map = NULL; > + char *gid_map = NULL; > + char *uidmap_value = NULL; > + char *gidmap_value = NULL; > + int ret = -1; > + > + if (ctrl->def->os.userns != VIR_DOMAIN_USER_NS_ENABLED) > + return 0; > + > + if (virAsprintf(&uid_map, "/proc/%d/uid_map", ctrl->initpid) < 0) > + goto cleanup; > + > + if (virAsprintf(&gid_map, "/proc/%d/gid_map", ctrl->initpid) < 0) > + goto cleanup; > + > + if (virAsprintf(&uidmap_value, "%u %u %u", > + ctrl->def->os.uidmap.first, > + ctrl->def->os.uidmap.low_first, > + ctrl->def->os.uidmap.count) < 0) > + goto cleanup; > + > + if (virAsprintf(&gidmap_value, "%u %u %u", > + ctrl->def->os.gidmap.first, > + ctrl->def->os.gidmap.low_first, > + ctrl->def->os.gidmap.count) < 0) > + goto cleanup; > + > + if (virFileWriteStr(uid_map, uidmap_value, 0) < 0) { > + if (errno == -ENOENT) > + virReportSystemError(errno, > + _("%s doesn't exist, please disable > userns"), > + uid_map); > + virReportSystemError(errno, _("unable write to %s"), uid_map); > + goto cleanup; > + } > + > + if (virFileWriteStr(gid_map, gidmap_value, 0) < 0) { > + if (errno == -ENOENT) > + virReportSystemError(errno, > + _("%s doesn't exist, please disable > userns"), > + gid_map); > + virReportSystemError(errno, _("unable write to %s"), gid_map); > + goto cleanup; > + } > + > + ret = 0; > +cleanup: > + VIR_FREE(uidmap_value); > + VIR_FREE(gidmap_value); > + VIR_FREE(uid_map); > + VIR_FREE(gid_map); > + return ret; > +} > + > > /** > * virLXCControllerMoveInterfaces > @@ -1454,6 +1517,9 @@ virLXCControllerRun(virLXCControllerPtr ctrl) > VIR_FORCE_CLOSE(control[1]); > VIR_FORCE_CLOSE(containerhandshake[1]); > > + if (virLXCControllerSetupUserns(ctrl) < 0) > + goto cleanup; > + > if (virLXCControllerMoveInterfaces(ctrl) < 0) > goto cleanup; > > -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list