Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
e8f6a15c
Commit
e8f6a15c
authored
Nov 18, 2015
by
Stéphane Graber
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #700 from hallyn/2015-11-17/preserve_ns.2
Better handle preserve_ns behavior
parents
9dbcd668
62d05d9b
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
34 additions
and
13 deletions
+34
-13
start.c
src/lxc/start.c
+34
-13
No files found.
src/lxc/start.c
View file @
e8f6a15c
...
@@ -124,8 +124,15 @@ static void close_ns(int ns_fd[LXC_NS_MAX]) {
...
@@ -124,8 +124,15 @@ static void close_ns(int ns_fd[LXC_NS_MAX]) {
}
}
}
}
static
int
preserve_ns
(
int
ns_fd
[
LXC_NS_MAX
],
int
clone_flags
,
pid_t
pid
)
{
/*
int
i
,
saved_errno
;
* preserve_ns: open /proc/@pid/ns/@ns for each namespace specified
* in clone_flags.
* Return true on success, false on failure. On failure, leave an error
* message in *errmsg, which caller must free.
*/
static
bool
preserve_ns
(
int
ns_fd
[
LXC_NS_MAX
],
int
clone_flags
,
pid_t
pid
,
char
**
errmsg
)
{
int
i
,
ret
;
char
path
[
MAXPATHLEN
];
char
path
[
MAXPATHLEN
];
for
(
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
for
(
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
...
@@ -133,8 +140,9 @@ static int preserve_ns(int ns_fd[LXC_NS_MAX], int clone_flags, pid_t pid) {
...
@@ -133,8 +140,9 @@ static int preserve_ns(int ns_fd[LXC_NS_MAX], int clone_flags, pid_t pid) {
snprintf
(
path
,
MAXPATHLEN
,
"/proc/%d/ns"
,
pid
);
snprintf
(
path
,
MAXPATHLEN
,
"/proc/%d/ns"
,
pid
);
if
(
access
(
path
,
X_OK
))
{
if
(
access
(
path
,
X_OK
))
{
WARN
(
"Kernel does not support attach; preserve_ns ignored"
);
if
(
asprintf
(
errmsg
,
"Kernel does not support setns."
)
==
-
1
)
return
0
;
*
errmsg
=
NULL
;
return
false
;
}
}
for
(
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
{
for
(
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
{
...
@@ -147,14 +155,20 @@ static int preserve_ns(int ns_fd[LXC_NS_MAX], int clone_flags, pid_t pid) {
...
@@ -147,14 +155,20 @@ static int preserve_ns(int ns_fd[LXC_NS_MAX], int clone_flags, pid_t pid) {
goto
error
;
goto
error
;
}
}
return
0
;
return
true
;
error:
error:
saved_errno
=
errno
;
if
(
errno
==
ENOENT
)
{
ret
=
asprintf
(
errmsg
,
"Kernel does not support setns for %s"
,
ns_info
[
i
].
proc_name
);
}
else
{
ret
=
asprintf
(
errmsg
,
"Failed to open %s: %s"
,
path
,
strerror
(
errno
));
}
if
(
ret
==
-
1
)
*
errmsg
=
NULL
;
close_ns
(
ns_fd
);
close_ns
(
ns_fd
);
errno
=
saved_errno
;
return
false
;
SYSERROR
(
"failed to open '%s'"
,
path
);
return
-
1
;
}
}
static
int
attach_ns
(
const
int
ns_fd
[
LXC_NS_MAX
])
{
static
int
attach_ns
(
const
int
ns_fd
[
LXC_NS_MAX
])
{
...
@@ -933,6 +947,7 @@ static int lxc_spawn(struct lxc_handler *handler)
...
@@ -933,6 +947,7 @@ static int lxc_spawn(struct lxc_handler *handler)
{
{
int
failed_before_rename
=
0
;
int
failed_before_rename
=
0
;
const
char
*
name
=
handler
->
name
;
const
char
*
name
=
handler
->
name
;
char
*
errmsg
=
NULL
;
bool
cgroups_connected
=
false
;
bool
cgroups_connected
=
false
;
int
saved_ns_fd
[
LXC_NS_MAX
];
int
saved_ns_fd
[
LXC_NS_MAX
];
int
preserve_mask
=
0
,
i
;
int
preserve_mask
=
0
,
i
;
...
@@ -1007,8 +1022,12 @@ static int lxc_spawn(struct lxc_handler *handler)
...
@@ -1007,8 +1022,12 @@ static int lxc_spawn(struct lxc_handler *handler)
INFO
(
"failed to pin the container's rootfs"
);
INFO
(
"failed to pin the container's rootfs"
);
}
}
if
(
preserve_ns
(
saved_ns_fd
,
preserve_mask
,
getpid
())
<
0
)
if
(
!
preserve_ns
(
saved_ns_fd
,
preserve_mask
,
getpid
(),
&
errmsg
))
{
SYSERROR
(
"Failed to preserve requested namespaces: %s"
,
errmsg
?
errmsg
:
"(Out of memory)"
);
free
(
errmsg
);
goto
out_delete_net
;
goto
out_delete_net
;
}
if
(
attach_ns
(
handler
->
conf
->
inherit_ns_fd
)
<
0
)
if
(
attach_ns
(
handler
->
conf
->
inherit_ns_fd
)
<
0
)
goto
out_delete_net
;
goto
out_delete_net
;
...
@@ -1028,9 +1047,11 @@ static int lxc_spawn(struct lxc_handler *handler)
...
@@ -1028,9 +1047,11 @@ static int lxc_spawn(struct lxc_handler *handler)
goto
out_delete_net
;
goto
out_delete_net
;
}
}
if
(
preserve_ns
(
handler
->
nsfd
,
handler
->
clone_flags
,
handler
->
pid
)
<
0
)
{
if
(
preserve_ns
(
handler
->
nsfd
,
handler
->
clone_flags
,
handler
->
pid
,
ERROR
(
"failed to store namespace references"
);
&
errmsg
)
<
0
)
{
goto
out_delete_net
;
INFO
(
"Failed to store namespace references for stop hook: %s"
,
errmsg
?
errmsg
:
"(Out of memory)"
);
free
(
errmsg
);
}
}
if
(
attach_ns
(
saved_ns_fd
))
if
(
attach_ns
(
saved_ns_fd
))
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment