From patchwork Mon Dec 3 20:05:00 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: DJ Delorie X-Patchwork-Id: 1007184 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=sourceware.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=libc-alpha-return-97912-incoming=patchwork.ozlabs.org@sourceware.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.b="nagHs7HO"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 437wvq27C6z9s8J for ; Tue, 4 Dec 2018 07:05:11 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:date:message-id:from:to:subject; q=dns; s= default; b=GMP9IyqjVtFVbZHOyvk5hf22FDklVllW9AtH3/kCt3g/5cdwOcMc1 KpGioUhALANzF3FflCm7OxKyr4oRc+HroWrC4NKTLn0roov+QoaQlmpyl99GVqHK qqb9Xrc/iTqLzN07jBhMR2rArrftkkhZ4T7WcMh8TmWrmTirThiBUY= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:date:message-id:from:to:subject; s=default; bh=MDypGwdef2imUJ4XOG2oG/vdTbw=; b=nagHs7HOishZjQO71UZ12wdOwUw7 gRjnMhVpyAUx51Dgx3yb3ET7SJnUhogQTjAPElOSUY9KDPiC3GGrDsi6KfKDS0bh C7lrXkjGp4pNzUAMJFXwfjbPyUsYfoYJyVmsUs+5RpShoQCp1veToGMcSwD2yTV6 OeXOPjd+F7K7lYk= Received: (qmail 116615 invoked by alias); 3 Dec 2018 20:05:05 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 116588 invoked by uid 89); 3 Dec 2018 20:05:05 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-24.9 required=5.0 tests=BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, SPF_HELO_PASS, UNSUBSCRIBE_BODY autolearn=ham version=3.3.2 spammy=corrections, alt, gid, ALT X-HELO: mx1.redhat.com Date: Mon, 03 Dec 2018 15:05:00 -0500 Message-Id: From: DJ Delorie To: libc-alpha@sourceware.org Subject: [patch] test-container: unshare hints and su mode Adding "su" to your .script causes the test to run with uid/gid 0/0 instead of the user's uid/gid. Also a repeat of the unshare hints patch, with all corrections as requested. * support/test-container.c (check_for_unshare_hints): New. (main): Call it if unshare fails. Add support for "su" scriptlet command. Reviewed-by: Carlos O'Donell diff --git a/support/test-container.c b/support/test-container.c index b58f0f7b3d..52ee787544 100644 --- a/support/test-container.c +++ b/support/test-container.c @@ -91,6 +91,7 @@ int verbose = 0; * mytest.root/mytset.script has a list of "commands" to run: syntax: # comment + su mv FILE FILE cp FILE FILE rm FILE @@ -610,6 +611,47 @@ rsync (char *src, char *dest, int and_delete) } + +/* See if we can detect what the user needs to do to get unshare + support working for us. */ +void +check_for_unshare_hints (void) +{ + FILE *f; + int i; + + /* Default Debian Linux disables user namespaces, but allows a way + to enable them. */ + f = fopen ("/proc/sys/kernel/unprivileged_userns_clone", "r"); + if (f != NULL) + { + i = 99; /* Sentinel. */ + fscanf (f, "%d", &i); + if (i == 0) + { + printf ("To enable test-container, please run this as root:\n"); + printf (" echo 1 > /proc/sys/kernel/unprivileged_userns_clone\n"); + } + fclose (f); + return; + } + + /* ALT Linux has an alternate way of doing the same. */ + f = fopen ("/proc/sys/kernel/userns_restrict", "r"); + if (f != NULL) + { + i = 99; /* Sentinel. */ + fscanf (f, "%d", &i); + if (i == 1) + { + printf ("To enable test-container, please run this as root:\n"); + printf (" echo 0 > /proc/sys/kernel/userns_restrict\n"); + } + fclose (f); + return; + } +} + int main (int argc, char **argv) { @@ -628,6 +670,8 @@ main (int argc, char **argv) uid_t original_uid; gid_t original_gid; + /* If set, the test runs as root instead of the user running the testsuite. */ + int be_su = 0; int UMAP; int GMAP; /* Used for "%lld %lld 1" so need not be large. */ @@ -857,6 +901,10 @@ main (int argc, char **argv) { maybe_xunlink (the_words[1]); } + else if (nt == 1 && strcmp (the_words[0], "su") == 0) + { + be_su = 1; + } else if (nt > 0 && the_words[0][0] != '#') { printf ("\033[31minvalid [%s]\033[0m\n", the_words[0]); @@ -873,7 +921,12 @@ main (int argc, char **argv) /* Older kernels may not support all the options, or security policy may block this call. */ if (errno == EINVAL || errno == EPERM) - FAIL_UNSUPPORTED ("unable to unshare user/fs: %s", strerror (errno)); + { + int saved_errno = errno; + if (errno == EPERM) + check_for_unshare_hints (); + FAIL_UNSUPPORTED ("unable to unshare user/fs: %s", strerror (saved_errno)); + } else FAIL_EXIT1 ("unable to unshare user/fs: %s", strerror (errno)); } @@ -952,7 +1005,7 @@ main (int argc, char **argv) FAIL_EXIT1 ("can't write to /proc/self/uid_map\n"); sprintf (tmp, "%lld %lld 1\n", - (long long) original_uid, (long long) original_uid); + (long long) (be_su ? 0 : original_uid), (long long) original_uid); write (UMAP, tmp, strlen (tmp)); xclose (UMAP); @@ -973,7 +1026,7 @@ main (int argc, char **argv) FAIL_EXIT1 ("can't write to /proc/self/gid_map\n"); sprintf (tmp, "%lld %lld 1\n", - (long long) original_gid, (long long) original_gid); + (long long) (be_su ? 0 : original_gid), (long long) original_gid); write (GMAP, tmp, strlen (tmp)); xclose (GMAP);