dcavalca / rpms / systemd

Forked from rpms/systemd 3 months ago
Clone
36e8a3
From 2115fcc1e673079fe76e949ac0904267075c25a4 Mon Sep 17 00:00:00 2001
36e8a3
From: Lennart Poettering <lennart@poettering.net>
36e8a3
Date: Wed, 31 Oct 2018 13:04:20 +0100
36e8a3
Subject: [PATCH] nspawn: beef up netns checking a bit, for compat with old
36e8a3
 kernels
36e8a3
36e8a3
Fixes: #10544
36e8a3
36e8a3
Cherry-picked from: 6619ad889da260cf83079cc74a85d571acd1df5a
36e8a3
---
36e8a3
 src/basic/stat-util.c     | 40 +++++++++++++++++++++++++++++++++++----
36e8a3
 src/nspawn/nspawn.c       |  8 +++++---
36e8a3
 src/test/test-stat-util.c | 15 +++++++++++++++
36e8a3
 3 files changed, 56 insertions(+), 7 deletions(-)
36e8a3
36e8a3
diff --git a/src/basic/stat-util.c b/src/basic/stat-util.c
4bff0a
index 07154e25bb..26aee9bad6 100644
36e8a3
--- a/src/basic/stat-util.c
36e8a3
+++ b/src/basic/stat-util.c
36e8a3
@@ -204,15 +204,47 @@ int fd_is_network_fs(int fd) {
36e8a3
 }
36e8a3
 
36e8a3
 int fd_is_network_ns(int fd) {
36e8a3
+        struct statfs s;
36e8a3
         int r;
36e8a3
 
36e8a3
-        r = fd_is_fs_type(fd, NSFS_MAGIC);
36e8a3
-        if (r <= 0)
36e8a3
-                return r;
36e8a3
+        /* Checks whether the specified file descriptor refers to a network namespace. On old kernels there's no nice
36e8a3
+         * way to detect that, hence on those we'll return a recognizable error (EUCLEAN), so that callers can handle
36e8a3
+         * this somewhat nicely.
36e8a3
+         *
36e8a3
+         * This function returns > 0 if the fd definitely refers to a network namespace, 0 if it definitely does not
36e8a3
+         * refer to a network namespace, -EUCLEAN if we can't determine, and other negative error codes on error. */
36e8a3
+
36e8a3
+        if (fstatfs(fd, &s) < 0)
36e8a3
+                return -errno;
36e8a3
+
36e8a3
+        if (!is_fs_type(&s, NSFS_MAGIC)) {
36e8a3
+                /* On really old kernels, there was no "nsfs", and network namespace sockets belonged to procfs
36e8a3
+                 * instead. Handle that in a somewhat smart way. */
36e8a3
+
36e8a3
+                if (is_fs_type(&s, PROC_SUPER_MAGIC)) {
36e8a3
+                        struct statfs t;
36e8a3
+
36e8a3
+                        /* OK, so it is procfs. Let's see if our own network namespace is procfs, too. If so, then the
36e8a3
+                         * passed fd might refer to a network namespace, but we can't know for sure. In that case,
36e8a3
+                         * return a recognizable error. */
36e8a3
+
36e8a3
+                        if (statfs("/proc/self/ns/net", &t) < 0)
36e8a3
+                                return -errno;
36e8a3
+
36e8a3
+                        if (s.f_type == t.f_type)
36e8a3
+                                return -EUCLEAN; /* It's possible, we simply don't know */
36e8a3
+                }
36e8a3
+
36e8a3
+                return 0; /* No! */
36e8a3
+        }
36e8a3
 
36e8a3
         r = ioctl(fd, NS_GET_NSTYPE);
36e8a3
-        if (r < 0)
36e8a3
+        if (r < 0) {
36e8a3
+                if (errno == ENOTTY) /* Old kernels didn't know this ioctl, let's also return a recognizable error in that case */
36e8a3
+                        return -EUCLEAN;
36e8a3
+
36e8a3
                 return -errno;
36e8a3
+        }
36e8a3
 
36e8a3
         return r == CLONE_NEWNET;
36e8a3
 }
36e8a3
diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c
4bff0a
index 56877bd932..8aec893a69 100644
36e8a3
--- a/src/nspawn/nspawn.c
36e8a3
+++ b/src/nspawn/nspawn.c
36e8a3
@@ -3701,10 +3701,12 @@ static int run(int master,
36e8a3
                         return log_error_errno(errno, "Cannot open file %s: %m", arg_network_namespace_path);
36e8a3
 
36e8a3
                 r = fd_is_network_ns(netns_fd);
36e8a3
-                if (r < 0 && r != -ENOTTY)
36e8a3
+                if (r == -EUCLEAN)
36e8a3
+                        log_debug_errno(r, "Cannot determine if passed network namespace path '%s' really refers to a network namespace, assuming it does.", arg_network_namespace_path);
36e8a3
+                else if (r < 0)
36e8a3
                         return log_error_errno(r, "Failed to check %s fs type: %m", arg_network_namespace_path);
36e8a3
-                if (r == 0) {
36e8a3
-                        log_error("Path %s doesn't refer to a network namespace", arg_network_namespace_path);
36e8a3
+                else if (r == 0) {
36e8a3
+                        log_error("Path %s doesn't refer to a network namespace, refusing.", arg_network_namespace_path);
36e8a3
                         return -EINVAL;
36e8a3
                 }
36e8a3
         }
36e8a3
diff --git a/src/test/test-stat-util.c b/src/test/test-stat-util.c
4bff0a
index 43f56a6c20..2b0564d8a0 100644
36e8a3
--- a/src/test/test-stat-util.c
36e8a3
+++ b/src/test/test-stat-util.c
36e8a3
@@ -67,11 +67,26 @@ static void test_path_is_temporary_fs(void) {
36e8a3
         assert_se(path_is_temporary_fs("/i-dont-exist") == -ENOENT);
36e8a3
 }
36e8a3
 
36e8a3
+static void test_fd_is_network_ns(void) {
36e8a3
+        _cleanup_close_ int fd = -1;
36e8a3
+        assert_se(fd_is_network_ns(STDIN_FILENO) == 0);
36e8a3
+        assert_se(fd_is_network_ns(STDERR_FILENO) == 0);
36e8a3
+        assert_se(fd_is_network_ns(STDOUT_FILENO) == 0);
36e8a3
+
36e8a3
+        assert_se((fd = open("/proc/self/ns/mnt", O_CLOEXEC|O_RDONLY)) >= 0);
36e8a3
+        assert_se(IN_SET(fd_is_network_ns(fd), 0, -EUCLEAN));
36e8a3
+        fd = safe_close(fd);
36e8a3
+
36e8a3
+        assert_se((fd = open("/proc/self/ns/net", O_CLOEXEC|O_RDONLY)) >= 0);
36e8a3
+        assert_se(IN_SET(fd_is_network_ns(fd), 1, -EUCLEAN));
36e8a3
+}
36e8a3
+
36e8a3
 int main(int argc, char *argv[]) {
36e8a3
         test_files_same();
36e8a3
         test_is_symlink();
36e8a3
         test_path_is_fs_type();
36e8a3
         test_path_is_temporary_fs();
36e8a3
+        test_fd_is_network_ns();
36e8a3
 
36e8a3
         return 0;
36e8a3
 }