mirror of
https://github.com/checkpoint-restore/criu
synced 2025-09-03 15:55:53 +00:00
userns: restore per-namespace mappings of user and group IDs (v4)
In this patch we fill /proc/PID/uid_map and /proc/PID/gid_map for the root task. v2: initialize groups in a new namespace. Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> v3: add a helper to initialize creds in a new userns v4: initialize userns creds in prepare_namespaces() Signed-off-by: Andrey Vagin <avagin@openvz.org> Signed-off-by: Pavel Emelyanov <xemul@parallels.com>
This commit is contained in:
committed by
Pavel Emelyanov
parent
cb2f9223a0
commit
fa266bb0cb
@@ -1729,6 +1729,13 @@ static int restore_root_task(struct pstree_item *init)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* uid_map and gid_map must be filled from a parent user namespace.
|
||||||
|
* prepare_userns_creds() must be called after filling mappings.
|
||||||
|
*/
|
||||||
|
if ((root_ns_mask & CLONE_NEWUSER) && prepare_userns(init))
|
||||||
|
goto out;
|
||||||
|
|
||||||
pr_info("Wait until namespaces are created\n");
|
pr_info("Wait until namespaces are created\n");
|
||||||
ret = restore_wait_inprogress_tasks();
|
ret = restore_wait_inprogress_tasks();
|
||||||
if (ret)
|
if (ret)
|
||||||
|
68
namespaces.c
68
namespaces.c
@@ -2,6 +2,8 @@
|
|||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
#include <sys/wait.h>
|
#include <sys/wait.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
|
#include <grp.h>
|
||||||
|
|
||||||
#include "cr-show.h"
|
#include "cr-show.h"
|
||||||
#include "util.h"
|
#include "util.h"
|
||||||
#include "imgset.h"
|
#include "imgset.h"
|
||||||
@@ -755,6 +757,58 @@ int dump_namespaces(struct pstree_item *item, unsigned int ns_flags)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int write_id_map(pid_t pid, UidGidExtent **extents, int n, char *id_map)
|
||||||
|
{
|
||||||
|
char buf[PAGE_SIZE];
|
||||||
|
int off = 0, i;
|
||||||
|
int fd;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* We can perform only a single write (that may contain multiple
|
||||||
|
* newline-delimited records) to a uid_map and a gid_map files.
|
||||||
|
*/
|
||||||
|
for (i = 0; i < n; i++)
|
||||||
|
off += snprintf(buf + off, sizeof(buf) - off,
|
||||||
|
"%d %d %d\n", extents[i]->first,
|
||||||
|
extents[i]->lower_first,
|
||||||
|
extents[i]->count);
|
||||||
|
|
||||||
|
fd = open_proc_rw(pid, "%s", id_map);
|
||||||
|
if (fd < 0)
|
||||||
|
return -1;
|
||||||
|
if (write(fd, buf, off) != off) {
|
||||||
|
pr_perror("Unable to write into %s\n", id_map);
|
||||||
|
close(fd);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
close(fd);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
int prepare_userns(struct pstree_item *item)
|
||||||
|
{
|
||||||
|
struct cr_img *img;
|
||||||
|
UsernsEntry *e;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
img = open_image(CR_FD_USERNS, O_RSTR, item->ids->user_ns_id);
|
||||||
|
if (!img)
|
||||||
|
return -1;
|
||||||
|
ret = pb_read_one(img, &e, PB_USERNS);
|
||||||
|
close_image(img);
|
||||||
|
if (ret < 0)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
if (write_id_map(item->pid.real, e->uid_map, e->n_uid_map, "uid_map"))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
if (write_id_map(item->pid.real, e->gid_map, e->n_gid_map, "gid_map"))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
int collect_namespaces(bool for_dump)
|
int collect_namespaces(bool for_dump)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
@@ -774,6 +828,17 @@ int collect_namespaces(bool for_dump)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int prepare_userns_creds()
|
||||||
|
{
|
||||||
|
/* UID and GID must be set after restoring /proc/PID/{uid,gid}_maps */
|
||||||
|
if (setuid(0) || setgid(0) || setgroups(0, NULL)) {
|
||||||
|
pr_perror("Unable to initialize id-s");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
int prepare_namespace(struct pstree_item *item, unsigned long clone_flags)
|
int prepare_namespace(struct pstree_item *item, unsigned long clone_flags)
|
||||||
{
|
{
|
||||||
pid_t pid = item->pid.virt;
|
pid_t pid = item->pid.virt;
|
||||||
@@ -782,6 +847,9 @@ int prepare_namespace(struct pstree_item *item, unsigned long clone_flags)
|
|||||||
pr_info("Restoring namespaces %d flags 0x%lx\n",
|
pr_info("Restoring namespaces %d flags 0x%lx\n",
|
||||||
item->pid.virt, clone_flags);
|
item->pid.virt, clone_flags);
|
||||||
|
|
||||||
|
if ((clone_flags & CLONE_NEWUSER) && prepare_userns_creds())
|
||||||
|
return -1;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* On netns restore we launch an IP tool, thus we
|
* On netns restore we launch an IP tool, thus we
|
||||||
* have to restore it _before_ altering the mount
|
* have to restore it _before_ altering the mount
|
||||||
|
Reference in New Issue
Block a user