[libvirt] [PATCH 1/2] lxc: Add virCgroupSetOwner()

Richard Weinberger richard at nod.at
Tue Feb 11 22:51:25 UTC 2014


Add a new helper function to change the permissions
of a control group.
This function is needed for user namespaces, we need to chmod()
the cgroup to the initial uid/gid such that systemd is allowed to
use the cgroup.

Signed-off-by: Richard Weinberger <richard at nod.at>
---
 src/libvirt_private.syms |  1 +
 src/lxc/lxc_cgroup.c     |  7 +++++++
 src/util/vircgroup.c     | 46 ++++++++++++++++++++++++++++++++++++++++++++++
 src/util/vircgroup.h     |  2 ++
 4 files changed, 56 insertions(+)

diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms
index 2c9536a..40e72f2 100644
--- a/src/libvirt_private.syms
+++ b/src/libvirt_private.syms
@@ -1056,6 +1056,7 @@ virCgroupSetMemory;
 virCgroupSetMemoryHardLimit;
 virCgroupSetMemorySoftLimit;
 virCgroupSetMemSwapHardLimit;
+virCgroupSetOwner;
 virCgroupSupportsCpuBW;
 
 
diff --git a/src/lxc/lxc_cgroup.c b/src/lxc/lxc_cgroup.c
index cc0d5e8..de93528 100644
--- a/src/lxc/lxc_cgroup.c
+++ b/src/lxc/lxc_cgroup.c
@@ -484,6 +484,13 @@ virCgroupPtr virLXCCgroupCreate(virDomainDefPtr def)
                             &cgroup) < 0)
         goto cleanup;
 
+    /* setup control group permissions for user namespace */
+    if (def->idmap.uidmap) {
+        if (virCgroupSetOwner(cgroup, def->idmap.uidmap[0].target,
+            def->idmap.gidmap[0].target))
+            goto cleanup;
+    }
+
 cleanup:
     return cgroup;
 }
diff --git a/src/util/vircgroup.c b/src/util/vircgroup.c
index a6d60c5..b2666e8 100644
--- a/src/util/vircgroup.c
+++ b/src/util/vircgroup.c
@@ -3252,6 +3252,52 @@ cleanup:
     return ret;
 }
 
+int virCgroupSetOwner(virCgroupPtr cgroup, uid_t uid, gid_t gid) {
+    size_t i;
+
+    for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
+        char *base, *entry;
+        DIR *dh;
+        struct dirent *de;
+
+        if (!cgroup->controllers[i].mountPoint)
+            continue;
+
+        if (virAsprintf(&base, "%s%s", cgroup->controllers[i].mountPoint,
+            cgroup->controllers[i].placement) < 0) {
+                virReportOOMError();
+                return -1;
+        }
+
+        dh = opendir(base);
+        while ((de = readdir(dh)) != NULL) {
+            if (STREQ(de->d_name, ".") ||
+                STREQ(de->d_name, ".."))
+                continue;
+
+            if (virAsprintf(&entry, "%s/%s", base, de->d_name) < 0) {
+                VIR_FREE(base);
+                virReportOOMError();
+            }
+
+            if (chown(entry, uid, gid) < 0)
+                virReportSystemError(errno, _("cannot chown '%s' to (%u, %u)"),
+                    entry, uid, gid);
+
+            VIR_FREE(entry);
+        }
+        closedir(dh);
+
+        if (chown(base, uid, gid) < 0)
+            virReportSystemError(errno, _("cannot chown '%s' to (%u, %u)"),
+                base, uid, gid);
+
+        VIR_FREE(base);
+    }
+
+    return 0;
+}
+
 
 /**
  * virCgroupSupportsCpuBW():
diff --git a/src/util/vircgroup.h b/src/util/vircgroup.h
index a70eb18..6e00f28 100644
--- a/src/util/vircgroup.h
+++ b/src/util/vircgroup.h
@@ -225,4 +225,6 @@ int virCgroupIsolateMount(virCgroupPtr group,
 
 bool virCgroupSupportsCpuBW(virCgroupPtr cgroup);
 
+int virCgroupSetOwner(virCgroupPtr cgroup, uid_t uid, gid_t gid);
+
 #endif /* __VIR_CGROUP_H__ */
-- 
1.8.4.5




More information about the libvir-list mailing list