Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
0fa84a8c
Unverified
Commit
0fa84a8c
authored
Jan 27, 2021
by
Stéphane Graber
Committed by
GitHub
Jan 27, 2021
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #3637 from brauner/2021-01-27/fixes
attach: fixes
parents
665fcdf9
b4959848
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
217 additions
and
223 deletions
+217
-223
attach.c
src/lxc/attach.c
+217
-223
No files found.
src/lxc/attach.c
View file @
0fa84a8c
...
...
@@ -109,8 +109,7 @@ static inline void lxc_proc_close_ns_fd(struct lxc_proc_context_info *ctx)
static
void
lxc_proc_put_context_info
(
struct
lxc_proc_context_info
*
ctx
)
{
free
(
ctx
->
lsm_label
);
ctx
->
lsm_label
=
NULL
;
free_disarm
(
ctx
->
lsm_label
);
if
(
ctx
->
container
)
{
lxc_container_put
(
ctx
->
container
);
...
...
@@ -645,7 +644,7 @@ static void lxc_put_attach_clone_payload(struct attach_clone_payload *p)
}
}
static
int
attach_child_main
(
struct
attach_clone_payload
*
payload
)
__noreturn
static
void
do_attach
(
struct
attach_clone_payload
*
payload
)
{
int
lsm_fd
,
ret
;
uid_t
new_uid
;
...
...
@@ -818,8 +817,7 @@ static int attach_child_main(struct attach_clone_payload *payload)
goto
on_error
;
}
close
(
payload
->
ipc_socket
);
payload
->
ipc_socket
=
-
EBADF
;
close_prot_errno_disarm
(
payload
->
ipc_socket
);
lxc_proc_put_context_info
(
init_ctx
);
payload
->
init_ctx
=
NULL
;
...
...
@@ -833,13 +831,16 @@ static int attach_child_main(struct attach_clone_payload *payload)
* may want to make sure the fds are closed, for example.
*/
if
(
options
->
stdin_fd
>=
0
&&
options
->
stdin_fd
!=
STDIN_FILENO
)
(
void
)
dup2
(
options
->
stdin_fd
,
STDIN_FILENO
);
if
(
dup2
(
options
->
stdin_fd
,
STDIN_FILENO
))
DEBUG
(
"Failed to replace stdin with %d"
,
options
->
stdin_fd
);
if
(
options
->
stdout_fd
>=
0
&&
options
->
stdout_fd
!=
STDOUT_FILENO
)
(
void
)
dup2
(
options
->
stdout_fd
,
STDOUT_FILENO
);
if
(
dup2
(
options
->
stdout_fd
,
STDOUT_FILENO
))
DEBUG
(
"Failed to replace stdout with %d"
,
options
->
stdin_fd
);
if
(
options
->
stderr_fd
>=
0
&&
options
->
stderr_fd
!=
STDERR_FILENO
)
(
void
)
dup2
(
options
->
stderr_fd
,
STDERR_FILENO
);
if
(
dup2
(
options
->
stderr_fd
,
STDERR_FILENO
))
DEBUG
(
"Failed to replace stderr with %d"
,
options
->
stdin_fd
);
/* close the old fds */
if
(
options
->
stdin_fd
>
STDERR_FILENO
)
...
...
@@ -893,6 +894,7 @@ static int attach_child_main(struct attach_clone_payload *payload)
on_error:
lxc_put_attach_clone_payload
(
payload
);
ERROR
(
"Failed to attach to container"
);
_exit
(
EXIT_FAILURE
);
}
...
...
@@ -952,9 +954,10 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
void
*
exec_payload
,
lxc_attach_options_t
*
options
,
pid_t
*
attached_process
)
{
__do_free
char
*
cwd
=
NULL
;
int
i
,
ret
,
status
;
int
ipc_sockets
[
2
];
char
*
cwd
,
*
new_cwd
;
char
*
new_cwd
;
signed
long
personality
;
pid_t
attached_pid
,
init_pid
,
pid
;
struct
lxc_proc_context_info
*
init_ctx
;
...
...
@@ -962,6 +965,9 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
struct
lxc_conf
*
conf
;
char
*
name
,
*
lxcpath
;
struct
attach_clone_payload
payload
=
{
0
};
int
ret_parent
=
-
1
;
pid_t
to_cleanup_pid
;
struct
lxc_epoll_descr
descr
=
{
0
};
ret
=
access
(
"/proc/self/ns"
,
X_OK
);
if
(
ret
)
...
...
@@ -1030,7 +1036,6 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
if
(
options
->
namespaces
==
-
1
)
{
ERROR
(
"Failed to automatically determine the "
"namespaces which the container uses"
);
free
(
cwd
);
lxc_proc_put_context_info
(
init_ctx
);
return
-
1
;
}
...
...
@@ -1080,7 +1085,6 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
for
(
j
=
0
;
j
<
i
;
j
++
)
close
(
init_ctx
->
ns_fd
[
j
]);
free
(
cwd
);
lxc_proc_put_context_info
(
init_ctx
);
return
-
1
;
}
...
...
@@ -1089,7 +1093,6 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
ret
=
lxc_attach_terminal
(
name
,
lxcpath
,
conf
,
&
terminal
);
if
(
ret
<
0
)
{
ERROR
(
"Failed to setup new terminal"
);
free
(
cwd
);
lxc_proc_put_context_info
(
init_ctx
);
return
-
1
;
}
...
...
@@ -1135,7 +1138,6 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
ret
=
socketpair
(
PF_LOCAL
,
SOCK_STREAM
|
SOCK_CLOEXEC
,
0
,
ipc_sockets
);
if
(
ret
<
0
)
{
SYSERROR
(
"Could not set up required IPC mechanism for attaching"
);
free
(
cwd
);
lxc_proc_put_context_info
(
init_ctx
);
return
-
1
;
}
...
...
@@ -1150,280 +1152,272 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
pid
=
fork
();
if
(
pid
<
0
)
{
SYSERROR
(
"Failed to create first subprocess"
);
free
(
cwd
);
lxc_proc_put_context_info
(
init_ctx
);
return
-
1
;
}
if
(
pid
)
{
int
ret_parent
=
-
1
;
pid_t
to_cleanup_pid
=
pid
;
struct
lxc_epoll_descr
descr
=
{
0
};
if
(
pid
==
0
)
{
/* close unneeded file descriptors */
close
(
ipc_sockets
[
1
]);
free
(
cwd
);
lxc_proc_close_ns_fd
(
init_ctx
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
lxc_attach_terminal_close_pts
(
&
terminal
);
close_prot_errno_disarm
(
ipc_sockets
[
0
]);
/* Attach to cgroup, if requested. */
if
(
options
->
attach_flags
&
LXC_ATTACH_MOVE_TO_CGROUP
)
{
/*
* If this is the unified hierarchy cgroup_attach() is
* enough.
*/
ret
=
cgroup_attach
(
conf
,
name
,
lxcpath
,
pid
);
if
(
ret
)
{
call_cleaner
(
cgroup_exit
)
struct
cgroup_ops
*
cgroup_ops
=
NULL
;
cgroup_ops
=
cgroup_init
(
conf
);
if
(
!
cgroup_ops
)
goto
on_error
;
if
(
!
cgroup_ops
->
attach
(
cgroup_ops
,
conf
,
name
,
lxcpath
,
pid
))
goto
on_error
;
}
TRACE
(
"Moved intermediate process %d into container's cgroups"
,
pid
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
lxc_attach_terminal_close_ptx
(
&
terminal
);
lxc_attach_terminal_close_peer
(
&
terminal
);
lxc_attach_terminal_close_log
(
&
terminal
);
}
/* Setup /proc limits */
if
(
!
lxc_list_empty
(
&
conf
->
procs
))
{
ret
=
setup_proc_filesystem
(
&
conf
->
procs
,
pid
);
if
(
ret
<
0
)
goto
on_error
;
/* Wait for the parent to have setup cgroups. */
ret
=
lxc_read_nointr
(
ipc_sockets
[
1
],
&
status
,
sizeof
(
status
));
if
(
ret
!=
sizeof
(
status
))
{
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
/* Setup resource limits */
if
(
!
lxc_list_empty
(
&
conf
->
limits
))
{
ret
=
setup_resource_limits
(
&
conf
->
limits
,
pid
);
if
(
ret
<
0
)
goto
on_error
;
TRACE
(
"Intermediate process starting to initialize"
);
/* Attach now, create another subprocess later, since pid namespaces
* only really affect the children of the current process.
*/
ret
=
lxc_attach_to_ns
(
init_pid
,
init_ctx
);
if
(
ret
<
0
)
{
ERROR
(
"Failed to enter namespaces"
);
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_attach_terminal_mainloop_init
(
&
terminal
,
&
descr
);
if
(
ret
<
0
)
goto
on_error
;
/* close namespace file descriptors */
lxc_proc_close_ns_fd
(
init_ctx
);
TRACE
(
"Initialized terminal mainloop"
);
/* Attach succeeded, try to cwd. */
if
(
options
->
initial_cwd
)
new_cwd
=
options
->
initial_cwd
;
else
new_cwd
=
cwd
;
if
(
new_cwd
)
{
ret
=
chdir
(
new_cwd
);
if
(
ret
<
0
)
WARN
(
"Could not change directory to
\"
%s
\"
"
,
new_cwd
);
}
/* Let the child process know to go ahead. */
status
=
0
;
ret
=
lxc_write_nointr
(
ipc_sockets
[
0
],
&
status
,
sizeof
(
status
));
if
(
ret
!=
sizeof
(
status
))
goto
close_mainloop
;
/* Create attached process. */
payload
.
ipc_socket
=
ipc_sockets
[
1
];
payload
.
options
=
options
;
payload
.
init_ctx
=
init_ctx
;
payload
.
terminal_pts_fd
=
terminal
.
pty
;
payload
.
exec_function
=
exec_function
;
payload
.
exec_payload
=
exec_payload
;
pid
=
lxc_raw_clone
(
CLONE_PARENT
,
NULL
);
if
(
pid
<
0
)
{
SYSERROR
(
"Failed to clone attached process"
);
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
TRACE
(
"Told intermediate process to start initializing"
);
if
(
pid
==
0
)
{
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_terminal_signal_sigmask_safe_blocked
(
&
terminal
);
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to reset signal mask"
);
_exit
(
EXIT_FAILURE
);
}
}
/* Get pid of attached process from intermediate process. */
ret
=
lxc_read_nointr
(
ipc_sockets
[
0
],
&
attached_pid
,
sizeof
(
attached_pid
));
if
(
ret
!=
sizeof
(
attached_pid
))
goto
close_mainloop
;
do_attach
(
&
payload
);
}
TRACE
(
"Received pid %d of attached process in parent pid namespace"
,
attached_pid
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
lxc_attach_terminal_close_pts
(
&
terminal
);
/* Ignore SIGKILL (CTRL-C) and SIGQUIT (CTRL-\) - issue #313. */
if
(
options
->
stdin_fd
==
0
)
{
signal
(
SIGINT
,
SIG_IGN
);
signal
(
SIGQUIT
,
SIG_IGN
);
/* Tell grandparent the pid of the pid of the newly created child. */
ret
=
lxc_write_nointr
(
ipc_sockets
[
1
],
&
pid
,
sizeof
(
pid
));
if
(
ret
!=
sizeof
(
pid
))
{
/* If this really happens here, this is very unfortunate, since
* the parent will not know the pid of the attached process and
* will not be able to wait for it (and we won't either due to
* CLONE_PARENT) so the parent won't be able to reap it and the
* attached process will remain a zombie.
*/
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
/* Reap intermediate process. */
ret
=
wait_for_pid
(
pid
);
if
(
ret
<
0
)
goto
close_mainloop
;
TRACE
(
"Sending pid %d of attached process"
,
pid
);
TRACE
(
"Intermediate process %d exited"
,
pid
);
/* The rest is in the hands of the initial and the attached process. */
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_SUCCESS
);
}
/* We will always have to reap the attached process now. */
to_cleanup_pid
=
attached_pid
;
to_cleanup_pid
=
pid
;
/* Open LSM fd and send it to child.
*/
if
((
options
->
namespaces
&
CLONE_NEWNS
)
&&
(
options
->
attach_flags
&
LXC_ATTACH_LSM
)
&&
init_ctx
->
lsm_label
)
{
int
labelfd
;
bool
on_exec
;
/* close unneeded file descriptors
*/
close
(
ipc_sockets
[
1
]);
free_disarm
(
cwd
);
lxc_proc_close_ns_fd
(
init_ctx
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
lxc_attach_terminal_close_pts
(
&
terminal
)
;
ret
=
-
1
;
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
labelfd
=
init_ctx
->
lsm_ops
->
process_label_fd_get
(
init_ctx
->
lsm_ops
,
attached_pid
,
on_exec
);
if
(
labelfd
<
0
)
goto
close_mainloop
;
/* Attach to cgroup, if requested. */
if
(
options
->
attach_flags
&
LXC_ATTACH_MOVE_TO_CGROUP
)
{
/*
* If this is the unified hierarchy cgroup_attach() is
* enough.
*/
ret
=
cgroup_attach
(
conf
,
name
,
lxcpath
,
pid
);
if
(
ret
)
{
call_cleaner
(
cgroup_exit
)
struct
cgroup_ops
*
cgroup_ops
=
NULL
;
TRACE
(
"Opened LSM label file descriptor %d"
,
labelfd
);
cgroup_ops
=
cgroup_init
(
conf
);
if
(
!
cgroup_ops
)
goto
on_error
;
/* Send child fd of the LSM security module to write to. */
ret
=
lxc_abstract_unix_send_fds
(
ipc_sockets
[
0
],
&
labelfd
,
1
,
NULL
,
0
)
;
if
(
ret
<=
0
)
{
if
(
ret
<
0
)
SYSERROR
(
"Failed to send lsm label fd"
);
if
(
!
cgroup_ops
->
attach
(
cgroup_ops
,
conf
,
name
,
lxcpath
,
pid
))
goto
on_error
;
}
TRACE
(
"Moved intermediate process %d into container's cgroups"
,
pid
);
}
close
(
labelfd
);
goto
close_mainloop
;
}
/* Setup /proc limits */
if
(
!
lxc_list_empty
(
&
conf
->
procs
))
{
ret
=
setup_proc_filesystem
(
&
conf
->
procs
,
pid
);
if
(
ret
<
0
)
goto
on_error
;
close
(
labelfd
);
TRACE
(
"Sent LSM label file descriptor %d to child"
,
labelfd
);
}
TRACE
(
"Setup /proc/%d settings"
,
pid
);
}
if
(
conf
->
seccomp
.
seccomp
)
{
ret
=
lxc_seccomp_recv_notifier_fd
(
&
conf
->
seccomp
,
ipc_sockets
[
0
]);
if
(
ret
<
0
)
goto
close_mainloop
;
/* Setup resource limits */
if
(
!
lxc_list_empty
(
&
conf
->
limits
))
{
ret
=
setup_resource_limits
(
&
conf
->
limits
,
pid
);
if
(
ret
<
0
)
goto
on_error
;
ret
=
lxc_seccomp_add_notifier
(
name
,
lxcpath
,
&
conf
->
seccomp
);
if
(
ret
<
0
)
goto
close_mainloop
;
}
TRACE
(
"Setup resource limits"
);
}
/* We're done, the child process should now execute whatever it
* is that the user requested. The parent can now track it with
* waitpid() or similar.
*/
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_attach_terminal_mainloop_init
(
&
terminal
,
&
descr
);
if
(
ret
<
0
)
goto
on_error
;
*
attached_process
=
attached_pid
;
TRACE
(
"Initialized terminal mainloop"
);
}
/* Now shut down communication with child, we're done. */
shutdown
(
ipc_sockets
[
0
],
SHUT_RDWR
);
close
(
ipc_sockets
[
0
]);
ipc_sockets
[
0
]
=
-
1
;
/* Let the child process know to go ahead. */
status
=
0
;
ret
=
lxc_write_nointr
(
ipc_sockets
[
0
],
&
status
,
sizeof
(
status
));
if
(
ret
!=
sizeof
(
status
))
goto
close_mainloop
;
ret_parent
=
0
;
to_cleanup_pid
=
-
1
;
TRACE
(
"Told intermediate process to start initializing"
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_mainloop
(
&
descr
,
-
1
);
if
(
ret
<
0
)
{
ret_parent
=
-
1
;
to_cleanup_pid
=
attached_pid
;
}
}
/* Get pid of attached process from intermediate process. */
ret
=
lxc_read_nointr
(
ipc_sockets
[
0
],
&
attached_pid
,
sizeof
(
attached_pid
));
if
(
ret
!=
sizeof
(
attached_pid
))
goto
close_mainloop
;
close_mainloop:
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
lxc_mainloop_close
(
&
descr
);
TRACE
(
"Received pid %d of attached process in parent pid namespace"
,
attached_pid
);
on_error:
if
(
ipc_sockets
[
0
]
>
=
0
)
{
shutdown
(
ipc_sockets
[
0
],
SHUT_RDWR
);
close
(
ipc_sockets
[
0
]
);
}
/* Ignore SIGKILL (CTRL-C) and SIGQUIT (CTRL-\) - issue #313. */
if
(
options
->
stdin_fd
=
=
0
)
{
signal
(
SIGINT
,
SIG_IGN
);
signal
(
SIGQUIT
,
SIG_IGN
);
}
if
(
to_cleanup_pid
>
0
)
(
void
)
wait_for_pid
(
to_cleanup_pid
);
/* Reap intermediate process. */
ret
=
wait_for_pid
(
pid
);
if
(
ret
<
0
)
goto
close_mainloop
;
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
lxc_terminal_delete
(
&
terminal
);
lxc_terminal_conf_free
(
&
terminal
);
}
TRACE
(
"Intermediate process %d exited"
,
pid
);
lxc_proc_put_context_info
(
init_ctx
);
return
ret_parent
;
}
/* We will always have to reap the attached process now. */
to_cleanup_pid
=
attached_pid
;
/* close unneeded file descriptors */
close_prot_errno_disarm
(
ipc_sockets
[
0
]);
/* Open LSM fd and send it to child. */
if
((
options
->
namespaces
&
CLONE_NEWNS
)
&&
(
options
->
attach_flags
&
LXC_ATTACH_LSM
)
&&
init_ctx
->
lsm_label
)
{
__do_close
int
labelfd
=
-
EBADF
;
bool
on_exec
;
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
lxc_attach_terminal_close_ptx
(
&
terminal
);
lxc_attach_terminal_close_peer
(
&
terminal
);
lxc_attach_terminal_close_log
(
&
terminal
);
}
ret
=
-
1
;
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
labelfd
=
init_ctx
->
lsm_ops
->
process_label_fd_get
(
init_ctx
->
lsm_ops
,
attached_pid
,
on_exec
);
if
(
labelfd
<
0
)
goto
close_mainloop
;
/* Wait for the parent to have setup cgroups. */
ret
=
lxc_read_nointr
(
ipc_sockets
[
1
],
&
status
,
sizeof
(
status
));
if
(
ret
!=
sizeof
(
status
))
{
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
TRACE
(
"Opened LSM label file descriptor %d"
,
labelfd
);
TRACE
(
"Intermediate process starting to initialize"
);
/* Send child fd of the LSM security module to write to. */
ret
=
lxc_abstract_unix_send_fds
(
ipc_sockets
[
0
],
&
labelfd
,
1
,
NULL
,
0
);
if
(
ret
<=
0
)
{
if
(
ret
<
0
)
SYSERROR
(
"Failed to send lsm label fd"
);
goto
close_mainloop
;
}
/* Attach now, create another subprocess later, since pid namespaces
* only really affect the children of the current process.
*/
ret
=
lxc_attach_to_ns
(
init_pid
,
init_ctx
);
if
(
ret
<
0
)
{
ERROR
(
"Failed to enter namespaces"
);
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
TRACE
(
"Sent LSM label file descriptor %d to child"
,
labelfd
);
}
/* close namespace file descriptors */
lxc_proc_close_ns_fd
(
init_ctx
);
if
(
conf
->
seccomp
.
seccomp
)
{
ret
=
lxc_seccomp_recv_notifier_fd
(
&
conf
->
seccomp
,
ipc_sockets
[
0
]);
if
(
ret
<
0
)
goto
close_mainloop
;
/* Attach succeeded, try to cwd. */
if
(
options
->
initial_cwd
)
new_cwd
=
options
->
initial_cwd
;
else
new_cwd
=
cwd
;
if
(
new_cwd
)
{
ret
=
chdir
(
new_cwd
);
ret
=
lxc_seccomp_add_notifier
(
name
,
lxcpath
,
&
conf
->
seccomp
);
if
(
ret
<
0
)
WARN
(
"Could not change directory to
\"
%s
\"
"
,
new_cwd
)
;
goto
close_mainloop
;
}
free
(
cwd
);
/* Create attached process. */
payload
.
ipc_socket
=
ipc_sockets
[
1
];
payload
.
options
=
options
;
payload
.
init_ctx
=
init_ctx
;
payload
.
terminal_pts_fd
=
terminal
.
pty
;
payload
.
exec_function
=
exec_function
;
payload
.
exec_payload
=
exec_payload
;
/* We're done, the child process should now execute whatever it
* is that the user requested. The parent can now track it with
* waitpid() or similar.
*/
pid
=
lxc_raw_clone
(
CLONE_PARENT
,
NULL
);
if
(
pid
<
0
)
{
SYSERROR
(
"Failed to clone attached process"
);
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
}
*
attached_process
=
attached_pid
;
if
(
pid
==
0
)
{
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_terminal_signal_sigmask_safe_blocked
(
&
terminal
);
if
(
ret
<
0
)
{
SYSERROR
(
"Failed to reset signal mask"
);
_exit
(
EXIT_FAILURE
);
}
}
/* Now shut down communication with child, we're done. */
shutdown
(
ipc_sockets
[
0
],
SHUT_RDWR
);
close
(
ipc_sockets
[
0
]);
ipc_sockets
[
0
]
=
-
1
;
ret
=
attach_child_main
(
&
payload
);
if
(
ret
<
0
)
ERROR
(
"Failed to exec"
);
ret_parent
=
0
;
to_cleanup_pid
=
-
1
;
_exit
(
EXIT_FAILURE
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
ret
=
lxc_mainloop
(
&
descr
,
-
1
);
if
(
ret
<
0
)
{
ret_parent
=
-
1
;
to_cleanup_pid
=
attached_pid
;
}
}
close_mainloop:
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
lxc_
attach_terminal_close_pts
(
&
terminal
);
lxc_
mainloop_close
(
&
descr
);
/* Tell grandparent the pid of the pid of the newly created child. */
ret
=
lxc_write_nointr
(
ipc_sockets
[
1
],
&
pid
,
sizeof
(
pid
));
if
(
ret
!=
sizeof
(
pid
))
{
/* If this really happens here, this is very unfortunate, since
* the parent will not know the pid of the attached process and
* will not be able to wait for it (and we won't either due to
* CLONE_PARENT) so the parent won't be able to reap it and the
* attached process will remain a zombie.
*/
shutdown
(
ipc_sockets
[
1
],
SHUT_RDWR
);
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_FAILURE
);
on_error:
if
(
ipc_sockets
[
0
]
>=
0
)
{
shutdown
(
ipc_sockets
[
0
],
SHUT_RDWR
);
close
(
ipc_sockets
[
0
]);
}
TRACE
(
"Sending pid %d of attached process"
,
pid
);
if
(
to_cleanup_pid
>
0
)
(
void
)
wait_for_pid
(
to_cleanup_pid
);
if
(
options
->
attach_flags
&
LXC_ATTACH_TERMINAL
)
{
lxc_terminal_delete
(
&
terminal
);
lxc_terminal_conf_free
(
&
terminal
);
}
/* The rest is in the hands of the initial and the attached process. */
lxc_proc_put_context_info
(
init_ctx
);
_exit
(
EXIT_SUCCESS
)
;
return
ret_parent
;
}
int
lxc_attach_run_command
(
void
*
payload
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment