[lxc-devel] [PATCH] uidmap: fix writing multiple ranges

Serge Hallyn serge.hallyn at ubuntu.com
Mon Mar 11 21:03:25 UTC 2013


Quoting Dwight Engen (dwight.engen at oracle.com):
> The kernel requires a single atomic write for setting the /proc
> idmap files. We were calling write(2) more than once when multiple
> ranges were configured so instead build a buffer to pass in one write(2)
> call.
> 
> Change id types to unsigned long to handle large id mappings gracefully.
> 
> Fix max id in example comment.
> 
> Signed-off-by: Dwight Engen <dwight.engen at oracle.com>

I'm really not sure that was intended, but I see it is in fact the case.
Thanks Dwight :)

Acked-by: Serge Hallyn <serge.hallyn at ubuntu.com>

> ---
>  src/lxc/conf.c    | 34 ++++++++++++++++++++++++++++------
>  src/lxc/conf.h    | 16 ++++++++--------
>  src/lxc/confile.c |  6 +++---
>  3 files changed, 39 insertions(+), 17 deletions(-)
> 
> diff --git a/src/lxc/conf.c b/src/lxc/conf.c
> index e2abc72..9700c7a 100644
> --- a/src/lxc/conf.c
> +++ b/src/lxc/conf.c
> @@ -2447,7 +2447,8 @@ int lxc_assign_network(struct lxc_list *network, pid_t pid)
>  	return 0;
>  }
>  
> -static int add_id_mapping(enum idtype idtype, pid_t pid, uid_t ns_start, uid_t host_start, int range)
> +static int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf,
> +			    size_t buf_size)
>  {
>  	char path[PATH_MAX];
>  	int ret, closeret;
> @@ -2463,7 +2464,7 @@ static int add_id_mapping(enum idtype idtype, pid_t pid, uid_t ns_start, uid_t h
>  		perror("open");
>  		return -EINVAL;
>  	}
> -	ret = fprintf(f, "%d %d %d", ns_start, host_start, range);
> +	ret = fwrite(buf, buf_size, 1, f);
>  	if (ret < 0)
>  		SYSERROR("writing id mapping");
>  	closeret = fclose(f);
> @@ -2477,13 +2478,34 @@ int lxc_map_ids(struct lxc_list *idmap, pid_t pid)
>  	struct lxc_list *iterator;
>  	struct id_map *map;
>  	int ret = 0;
> -
> -	lxc_list_for_each(iterator, idmap) {
> -		map = iterator->elem;
> -		ret = add_id_mapping(map->idtype, pid, map->nsid, map->hostid, map->range);
> +	char *buf,*pos;
> +	enum idtype type;
> +
> +	/* The kernel only takes <= 4k for writes to /proc/<nr>/[ug]id_map */
> +	buf = pos = malloc(4096);
> +	if (!buf)
> +		return -ENOMEM;
> +
> +	for(type = ID_TYPE_UID; type <= ID_TYPE_GID; type++) {
> +		int left,fill;
> +		lxc_list_for_each(iterator, idmap) {
> +			map = iterator->elem;
> +			if (map->idtype == type) {
> +				left = 4096 - (pos - buf);
> +				fill = snprintf(pos, left, "%lu %lu %lu\n",
> +					map->nsid, map->hostid, map->range);
> +				if (fill <= 0 || fill >= left)
> +					SYSERROR("snprintf failed, too many mappings");
> +				pos += fill;
> +			}
> +		}
> +		ret = write_id_mapping(type, pid, buf, pos-buf);
>  		if (ret)
>  			break;
> +		pos = buf;
>  	}
> +
> +	free(buf);
>  	return ret;
>  }
>  
> diff --git a/src/lxc/conf.h b/src/lxc/conf.h
> index f20fb2f..cc7961a 100644
> --- a/src/lxc/conf.h
> +++ b/src/lxc/conf.h
> @@ -149,17 +149,17 @@ enum idtype {
>  
>  /*
>   * id_map is an id map entry.  Form in confile is:
> - * lxc.id_map = U 9800 0 100
> - * lxc.id_map = U 9900 1000 100
> - * lxc.id_map = G 9800 0 100
> - * lxc.id_map = G 9900 1000 100
> - * meaning the container can use uids and gids 0-100 and 1000-1100,
> - * with uid 0 mapping to uid 9800 on the host, and gid 1000 to
> - * gid 9900 on the host.
> + * lxc.id_map = u 0    9800 100
> + * lxc.id_map = u 1000 9900 100
> + * lxc.id_map = g 0    9800 100
> + * lxc.id_map = g 1000 9900 100
> + * meaning the container can use uids and gids 0-99 and 1000-1099,
> + * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to
> + * [ug]id 9900 on the host.
>   */
>  struct id_map {
>  	enum idtype idtype;
> -	int hostid, nsid, range;
> +	unsigned long hostid, nsid, range;
>  };
>  
>  /*
> diff --git a/src/lxc/confile.c b/src/lxc/confile.c
> index 59cedef..0b1fd51 100644
> --- a/src/lxc/confile.c
> +++ b/src/lxc/confile.c
> @@ -1024,7 +1024,7 @@ static int config_idmap(const char *key, const char *value, struct lxc_conf *lxc
>  	char *subkey;
>  	struct lxc_list *idmaplist = NULL;
>  	struct id_map *idmap = NULL;
> -	int hostid, nsid, range;
> +	unsigned long hostid, nsid, range;
>  	char type;
>  	int ret;
>  
> @@ -1049,10 +1049,10 @@ static int config_idmap(const char *key, const char *value, struct lxc_conf *lxc
>  
>  	lxc_list_add_tail(&lxc_conf->id_map, idmaplist);
>  
> -	ret = sscanf(value, "%c %d %d %d", &type, &nsid, &hostid, &range);
> +	ret = sscanf(value, "%c %lu %lu %lu", &type, &nsid, &hostid, &range);
>  	if (ret != 4)
>  		goto out;
> -	INFO("read uid map: type %c nsid %d hostid %d range %d", type, nsid, hostid, range);
> +	INFO("read uid map: type %c nsid %lu hostid %lu range %lu", type, nsid, hostid, range);
>  	if (type == 'u')
>  		idmap->idtype = ID_TYPE_UID;
>  	else if (type == 'g')
> -- 
> 1.7.12.3
> 
> 
> ------------------------------------------------------------------------------
> Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
> Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
> endpoint security space. For insight on selecting the right partner to 
> tackle endpoint security challenges, access the full report. 
> http://p.sf.net/sfu/symantec-dev2dev
> _______________________________________________
> Lxc-devel mailing list
> Lxc-devel at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/lxc-devel




More information about the lxc-devel mailing list