diff options
author | Eelco Dolstra <edolstra@gmail.com> | 2018-11-13T15·15+0100 |
---|---|---|
committer | Eelco Dolstra <edolstra@gmail.com> | 2018-11-13T15·15+0100 |
commit | a0ef21262f4d5652bfb65cfacaec01d89c475a93 (patch) | |
tree | 6fd2c483dde9bb6f56ff989b6724d2a49679d74a /src/libutil/util.cc | |
parent | 56f6e382be03b587c1f7260e16fce6622329d1a4 (diff) |
Restore parent mount namespace before executing a child process
This ensures that they can't write to /nix/store. Fixes #2535.
Diffstat (limited to 'src/libutil/util.cc')
-rw-r--r-- | src/libutil/util.cc | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/src/libutil/util.cc b/src/libutil/util.cc index 259eaf0a0dd3..6e4536e6e4ea 100644 --- a/src/libutil/util.cc +++ b/src/libutil/util.cc @@ -936,6 +936,7 @@ pid_t startProcess(std::function<void()> fun, const ProcessOptions & options) throw SysError("setting death signal"); #endif restoreAffinity(); + restoreMountNamespace(); fun(); } catch (std::exception & e) { try { @@ -1504,4 +1505,26 @@ std::unique_ptr<InterruptCallback> createInterruptCallback(std::function<void()> return std::unique_ptr<InterruptCallback>(res.release()); } +static AutoCloseFD fdSavedMountNamespace; + +void saveMountNamespace() +{ +#if __linux__ + std::once_flag done; + std::call_once(done, []() { + fdSavedMountNamespace = open("/proc/self/ns/mnt", O_RDONLY); + if (!fdSavedMountNamespace) + throw SysError("saving parent mount namespace"); + }); +#endif +} + +void restoreMountNamespace() +{ +#if __linux__ + if (fdSavedMountNamespace && setns(fdSavedMountNamespace.get(), CLONE_NEWNS) == -1) + throw SysError("restoring parent mount namespace"); +#endif +} + } |