9ff990a2b9
The implementation in libcontainer/system is quite complicated, and we only use it to detect if user-namespaces are enabled. In addition, the implementation in containerd uses a sync.Once, so that detection (and reading/parsing `/proc/self/uid_map`) is only performed once. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
114 lines
3.8 KiB
Go
114 lines
3.8 KiB
Go
package chrootarchive // import "github.com/docker/docker/pkg/chrootarchive"
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/containerd/containerd/sys"
|
|
"github.com/moby/sys/mount"
|
|
"github.com/moby/sys/mountinfo"
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
// chroot on linux uses pivot_root instead of chroot
|
|
// pivot_root takes a new root and an old root.
|
|
// Old root must be a sub-dir of new root, it is where the current rootfs will reside after the call to pivot_root.
|
|
// New root is where the new rootfs is set to.
|
|
// Old root is removed after the call to pivot_root so it is no longer available under the new root.
|
|
// This is similar to how libcontainer sets up a container's rootfs
|
|
func chroot(path string) (err error) {
|
|
// if the engine is running in a user namespace we need to use actual chroot
|
|
if sys.RunningInUserNS() {
|
|
return realChroot(path)
|
|
}
|
|
if err := unix.Unshare(unix.CLONE_NEWNS); err != nil {
|
|
return fmt.Errorf("Error creating mount namespace before pivot: %v", err)
|
|
}
|
|
|
|
// Make everything in new ns slave.
|
|
// Don't use `private` here as this could race where the mountns gets a
|
|
// reference to a mount and an unmount from the host does not propagate,
|
|
// which could potentially cause transient errors for other operations,
|
|
// even though this should be relatively small window here `slave` should
|
|
// not cause any problems.
|
|
if err := mount.MakeRSlave("/"); err != nil {
|
|
return err
|
|
}
|
|
|
|
if mounted, _ := mountinfo.Mounted(path); !mounted {
|
|
if err := mount.Mount(path, path, "bind", "rbind,rw"); err != nil {
|
|
return realChroot(path)
|
|
}
|
|
}
|
|
|
|
// setup oldRoot for pivot_root
|
|
pivotDir, err := ioutil.TempDir(path, ".pivot_root")
|
|
if err != nil {
|
|
return fmt.Errorf("Error setting up pivot dir: %v", err)
|
|
}
|
|
|
|
var mounted bool
|
|
defer func() {
|
|
if mounted {
|
|
// make sure pivotDir is not mounted before we try to remove it
|
|
if errCleanup := unix.Unmount(pivotDir, unix.MNT_DETACH); errCleanup != nil {
|
|
if err == nil {
|
|
err = errCleanup
|
|
}
|
|
return
|
|
}
|
|
}
|
|
|
|
errCleanup := os.Remove(pivotDir)
|
|
// pivotDir doesn't exist if pivot_root failed and chroot+chdir was successful
|
|
// because we already cleaned it up on failed pivot_root
|
|
if errCleanup != nil && !os.IsNotExist(errCleanup) {
|
|
errCleanup = fmt.Errorf("Error cleaning up after pivot: %v", errCleanup)
|
|
if err == nil {
|
|
err = errCleanup
|
|
}
|
|
}
|
|
}()
|
|
|
|
if err := unix.PivotRoot(path, pivotDir); err != nil {
|
|
// If pivot fails, fall back to the normal chroot after cleaning up temp dir
|
|
if err := os.Remove(pivotDir); err != nil {
|
|
return fmt.Errorf("Error cleaning up after failed pivot: %v", err)
|
|
}
|
|
return realChroot(path)
|
|
}
|
|
mounted = true
|
|
|
|
// This is the new path for where the old root (prior to the pivot) has been moved to
|
|
// This dir contains the rootfs of the caller, which we need to remove so it is not visible during extraction
|
|
pivotDir = filepath.Join("/", filepath.Base(pivotDir))
|
|
|
|
if err := unix.Chdir("/"); err != nil {
|
|
return fmt.Errorf("Error changing to new root: %v", err)
|
|
}
|
|
|
|
// Make the pivotDir (where the old root lives) private so it can be unmounted without propagating to the host
|
|
if err := unix.Mount("", pivotDir, "", unix.MS_PRIVATE|unix.MS_REC, ""); err != nil {
|
|
return fmt.Errorf("Error making old root private after pivot: %v", err)
|
|
}
|
|
|
|
// Now unmount the old root so it's no longer visible from the new root
|
|
if err := unix.Unmount(pivotDir, unix.MNT_DETACH); err != nil {
|
|
return fmt.Errorf("Error while unmounting old root after pivot: %v", err)
|
|
}
|
|
mounted = false
|
|
|
|
return nil
|
|
}
|
|
|
|
func realChroot(path string) error {
|
|
if err := unix.Chroot(path); err != nil {
|
|
return fmt.Errorf("Error after fallback to chroot: %v", err)
|
|
}
|
|
if err := unix.Chdir("/"); err != nil {
|
|
return fmt.Errorf("Error changing to new root after chroot: %v", err)
|
|
}
|
|
return nil
|
|
}
|