mirror of
https://github.com/privatevoid-net/nix-super.git
synced 2024-11-10 16:26:18 +02:00
ac89bb064a
All OS and IO operations should be moved out, leaving only some misc portable pure functions. This is useful to avoid copious CPP when doing things like Windows and Emscripten ports. Newly exposed functions to break cycles: - `restoreSignals` - `updateWindowSize`
160 lines
4.2 KiB
C++
160 lines
4.2 KiB
C++
#include "current-process.hh"
|
|
#include "util.hh"
|
|
#include "finally.hh"
|
|
#include "file-system.hh"
|
|
#include "processes.hh"
|
|
#include "signals.hh"
|
|
|
|
#if __linux__
|
|
# include <mutex>
|
|
# include <sys/resource.h>
|
|
# include "cgroup.hh"
|
|
#endif
|
|
|
|
#include <sys/mount.h>
|
|
|
|
namespace nix {
|
|
|
|
#if __linux__
|
|
|
|
bool userNamespacesSupported()
|
|
{
|
|
static auto res = [&]() -> bool
|
|
{
|
|
if (!pathExists("/proc/self/ns/user")) {
|
|
debug("'/proc/self/ns/user' does not exist; your kernel was likely built without CONFIG_USER_NS=y");
|
|
return false;
|
|
}
|
|
|
|
Path maxUserNamespaces = "/proc/sys/user/max_user_namespaces";
|
|
if (!pathExists(maxUserNamespaces) ||
|
|
trim(readFile(maxUserNamespaces)) == "0")
|
|
{
|
|
debug("user namespaces appear to be disabled; check '/proc/sys/user/max_user_namespaces'");
|
|
return false;
|
|
}
|
|
|
|
Path procSysKernelUnprivilegedUsernsClone = "/proc/sys/kernel/unprivileged_userns_clone";
|
|
if (pathExists(procSysKernelUnprivilegedUsernsClone)
|
|
&& trim(readFile(procSysKernelUnprivilegedUsernsClone)) == "0")
|
|
{
|
|
debug("user namespaces appear to be disabled; check '/proc/sys/kernel/unprivileged_userns_clone'");
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
Pid pid = startProcess([&]()
|
|
{
|
|
_exit(0);
|
|
}, {
|
|
.cloneFlags = CLONE_NEWUSER
|
|
});
|
|
|
|
auto r = pid.wait();
|
|
assert(!r);
|
|
} catch (SysError & e) {
|
|
debug("user namespaces do not work on this system: %s", e.msg());
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}();
|
|
return res;
|
|
}
|
|
|
|
bool mountAndPidNamespacesSupported()
|
|
{
|
|
static auto res = [&]() -> bool
|
|
{
|
|
try {
|
|
|
|
Pid pid = startProcess([&]()
|
|
{
|
|
/* Make sure we don't remount the parent's /proc. */
|
|
if (mount(0, "/", 0, MS_PRIVATE | MS_REC, 0) == -1)
|
|
_exit(1);
|
|
|
|
/* Test whether we can remount /proc. The kernel disallows
|
|
this if /proc is not fully visible, i.e. if there are
|
|
filesystems mounted on top of files inside /proc. See
|
|
https://lore.kernel.org/lkml/87tvsrjai0.fsf@xmission.com/T/. */
|
|
if (mount("none", "/proc", "proc", 0, 0) == -1)
|
|
_exit(2);
|
|
|
|
_exit(0);
|
|
}, {
|
|
.cloneFlags = CLONE_NEWNS | CLONE_NEWPID | (userNamespacesSupported() ? CLONE_NEWUSER : 0)
|
|
});
|
|
|
|
if (pid.wait()) {
|
|
debug("PID namespaces do not work on this system: cannot remount /proc");
|
|
return false;
|
|
}
|
|
|
|
} catch (SysError & e) {
|
|
debug("mount namespaces do not work on this system: %s", e.msg());
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}();
|
|
return res;
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
#if __linux__
|
|
static AutoCloseFD fdSavedMountNamespace;
|
|
static AutoCloseFD fdSavedRoot;
|
|
#endif
|
|
|
|
void saveMountNamespace()
|
|
{
|
|
#if __linux__
|
|
static std::once_flag done;
|
|
std::call_once(done, []() {
|
|
fdSavedMountNamespace = open("/proc/self/ns/mnt", O_RDONLY);
|
|
if (!fdSavedMountNamespace)
|
|
throw SysError("saving parent mount namespace");
|
|
|
|
fdSavedRoot = open("/proc/self/root", O_RDONLY);
|
|
});
|
|
#endif
|
|
}
|
|
|
|
void restoreMountNamespace()
|
|
{
|
|
#if __linux__
|
|
try {
|
|
auto savedCwd = absPath(".");
|
|
|
|
if (fdSavedMountNamespace && setns(fdSavedMountNamespace.get(), CLONE_NEWNS) == -1)
|
|
throw SysError("restoring parent mount namespace");
|
|
|
|
if (fdSavedRoot) {
|
|
if (fchdir(fdSavedRoot.get()))
|
|
throw SysError("chdir into saved root");
|
|
if (chroot("."))
|
|
throw SysError("chroot into saved root");
|
|
}
|
|
|
|
if (chdir(savedCwd.c_str()) == -1)
|
|
throw SysError("restoring cwd");
|
|
} catch (Error & e) {
|
|
debug(e.msg());
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void unshareFilesystem()
|
|
{
|
|
#ifdef __linux__
|
|
if (unshare(CLONE_FS) != 0 && errno != EPERM)
|
|
throw SysError("unsharing filesystem state in download thread");
|
|
#endif
|
|
}
|
|
|
|
}
|