c575770b75
Lets go further and make /lib/modules/ inaccessible for services that do not have business with modules, this is a minor improvment but it may help on setups with custom modules and they are limited... in regard of kernel auto-load feature. This change introduce NameSpaceInfo struct which we may embed later inside ExecContext but for now lets just reduce the argument number to setup_namespace() and merge ProtectKernelModules feature.
104 lines
3.2 KiB
C
104 lines
3.2 KiB
C
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2010 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
|
|
#include "log.h"
|
|
#include "namespace.h"
|
|
|
|
int main(int argc, char *argv[]) {
|
|
const char * const writable[] = {
|
|
"/home",
|
|
"-/home/lennart/projects/foobar", /* this should be masked automatically */
|
|
NULL
|
|
};
|
|
|
|
const char * const readonly[] = {
|
|
/* "/", */
|
|
/* "/usr", */
|
|
"/boot",
|
|
"/lib",
|
|
"/usr/lib",
|
|
"-/lib64",
|
|
"-/usr/lib64",
|
|
NULL
|
|
};
|
|
|
|
const char *inaccessible[] = {
|
|
"/home/lennart/projects",
|
|
NULL
|
|
};
|
|
|
|
static const NameSpaceInfo ns_info = {
|
|
.private_dev = true,
|
|
.protect_control_groups = true,
|
|
.protect_kernel_tunables = true,
|
|
.protect_kernel_modules = true,
|
|
};
|
|
|
|
char *root_directory;
|
|
char *projects_directory;
|
|
int r;
|
|
char tmp_dir[] = "/tmp/systemd-private-XXXXXX",
|
|
var_tmp_dir[] = "/var/tmp/systemd-private-XXXXXX";
|
|
|
|
log_set_max_level(LOG_DEBUG);
|
|
|
|
assert_se(mkdtemp(tmp_dir));
|
|
assert_se(mkdtemp(var_tmp_dir));
|
|
|
|
root_directory = getenv("TEST_NS_CHROOT");
|
|
projects_directory = getenv("TEST_NS_PROJECTS");
|
|
|
|
if (projects_directory)
|
|
inaccessible[0] = projects_directory;
|
|
|
|
log_info("Inaccessible directory: '%s'", inaccessible[0]);
|
|
if (root_directory)
|
|
log_info("Chroot: '%s'", root_directory);
|
|
else
|
|
log_info("Not chrooted");
|
|
|
|
r = setup_namespace(root_directory,
|
|
&ns_info,
|
|
(char **) writable,
|
|
(char **) readonly,
|
|
(char **) inaccessible,
|
|
tmp_dir,
|
|
var_tmp_dir,
|
|
PROTECT_HOME_NO,
|
|
PROTECT_SYSTEM_NO,
|
|
0);
|
|
if (r < 0) {
|
|
log_error_errno(r, "Failed to setup namespace: %m");
|
|
|
|
log_info("Usage:\n"
|
|
" sudo TEST_NS_PROJECTS=/home/lennart/projects ./test-ns\n"
|
|
" sudo TEST_NS_CHROOT=/home/alban/debian-tree TEST_NS_PROJECTS=/home/alban/debian-tree/home/alban/Documents ./test-ns");
|
|
|
|
return 1;
|
|
}
|
|
|
|
execl("/bin/sh", "/bin/sh", NULL);
|
|
log_error_errno(errno, "execl(): %m");
|
|
|
|
return 1;
|
|
}
|