Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
eb09dc4e
Commit
eb09dc4e
authored
May 10, 2017
by
Serge Hallyn
Committed by
GitHub
May 10, 2017
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #1544 from brauner/2017-05-08/harden_console_handling
harden console handling
parents
9fd8b8a7
467c7ff3
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
251 additions
and
122 deletions
+251
-122
userns.conf.in
config/templates/userns.conf.in
+0
-1
lxc.container.conf.sgml.in
doc/lxc.container.conf.sgml.in
+10
-5
conf.c
src/lxc/conf.c
+158
-80
console.c
src/lxc/console.c
+50
-36
utils.c
src/lxc/utils.c
+26
-0
utils.h
src/lxc/utils.h
+7
-0
No files found.
config/templates/userns.conf.in
View file @
eb09dc4e
...
...
@@ -6,7 +6,6 @@ lxc.cgroup.devices.allow =
lxc.devttydir =
# Extra bind-mounts for userns
lxc.mount.entry = /dev/console dev/console none bind,create=file 0 0
lxc.mount.entry = /dev/full dev/full none bind,create=file 0 0
lxc.mount.entry = /dev/null dev/null none bind,create=file 0 0
lxc.mount.entry = /dev/random dev/random none bind,create=file 0 0
...
...
doc/lxc.container.conf.sgml.in
View file @
eb09dc4e
...
...
@@ -668,10 +668,13 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
<listitem>
<para>
Specify a path to a device to which the console will be
attached. The keyword 'none' will simply disable the
console. This is dangerous once if have a rootfs with a
console device file where the application can write, the
messages will fall in the host.
attached. The keyword 'none' will simply disable the
console. Note, when specifying 'none' and creating a device node
for the console in the container at /dev/console or bind-mounting
the hosts's /dev/console into the container at /dev/console the
container will have direct access to the hosts's /dev/console.
This is dangerous when the container has write access to the
device and should thus be used with caution.
</para>
</listitem>
</varlistentry>
...
...
@@ -727,7 +730,9 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
<listitem>
<para>
Specify a directory under <filename>/dev</filename>
under which to create the container console devices.
under which to create the container console devices. Note that LXC
will move any bind-mounts or device nodes for /dev/console into
this directory.
</para>
</listitem>
</varlistentry>
...
...
src/lxc/conf.c
View file @
eb09dc4e
...
...
@@ -1169,45 +1169,47 @@ static const struct lxc_devs lxc_devs[] = {
{
"urandom"
,
S_IFCHR
|
S_IRWXU
|
S_IRWXG
|
S_IRWXO
,
1
,
9
},
{
"random"
,
S_IFCHR
|
S_IRWXU
|
S_IRWXG
|
S_IRWXO
,
1
,
8
},
{
"tty"
,
S_IFCHR
|
S_IRWXU
|
S_IRWXG
|
S_IRWXO
,
5
,
0
},
{
"console"
,
S_IFCHR
|
S_IRUSR
|
S_IWUSR
,
5
,
1
},
};
static
int
fill_autodev
(
const
struct
lxc_rootfs
*
rootfs
,
bool
mount_console
)
static
int
lxc_fill_autodev
(
const
struct
lxc_rootfs
*
rootfs
)
{
int
ret
;
char
path
[
MAXPATHLEN
];
int
i
;
mode_t
cmask
;
INFO
(
"Creating initial consoles under container /dev"
);
ret
=
snprintf
(
path
,
MAXPATHLEN
,
"%s/dev"
,
rootfs
->
path
?
rootfs
->
mount
:
""
);
if
(
ret
<
0
||
ret
>=
MAXPATHLEN
)
{
ERROR
(
"Error calculating container /dev location"
);
return
-
1
;
}
if
(
!
dir_exists
(
path
))
// ignore, just don't try to fill in
/* ignore, just don't try to fill in */
if
(
!
dir_exists
(
path
))
return
0
;
INFO
(
"
P
opulating container /dev"
);
INFO
(
"
p
opulating container /dev"
);
cmask
=
umask
(
S_IXUSR
|
S_IXGRP
|
S_IXOTH
);
for
(
i
=
0
;
i
<
sizeof
(
lxc_devs
)
/
sizeof
(
lxc_devs
[
0
]);
i
++
)
{
const
struct
lxc_devs
*
d
=
&
lxc_devs
[
i
];
if
(
!
strcmp
(
d
->
name
,
"console"
)
&&
!
mount_console
)
continue
;
ret
=
snprintf
(
path
,
MAXPATHLEN
,
"%s/dev/%s"
,
rootfs
->
path
?
rootfs
->
mount
:
""
,
d
->
name
);
if
(
ret
<
0
||
ret
>=
MAXPATHLEN
)
return
-
1
;
ret
=
mknod
(
path
,
d
->
mode
,
makedev
(
d
->
maj
,
d
->
min
));
if
(
ret
&&
errno
!=
EEXIST
)
{
if
(
ret
<
0
)
{
char
hostpath
[
MAXPATHLEN
];
FILE
*
pathfile
;
// Unprivileged containers cannot create devices, so
// bind mount the device from the host
if
(
errno
==
EEXIST
)
{
DEBUG
(
"
\"
%s
\"
device already existed"
,
path
);
continue
;
}
/* Unprivileged containers cannot create devices, so
* bind mount the device from the host.
*/
ret
=
snprintf
(
hostpath
,
MAXPATHLEN
,
"/dev/%s"
,
d
->
name
);
if
(
ret
<
0
||
ret
>=
MAXPATHLEN
)
return
-
1
;
...
...
@@ -1217,17 +1219,18 @@ static int fill_autodev(const struct lxc_rootfs *rootfs, bool mount_console)
return
-
1
;
}
fclose
(
pathfile
);
if
(
safe_mount
(
hostpath
,
path
,
0
,
MS_BIND
,
NULL
,
rootfs
->
path
?
rootfs
->
mount
:
NULL
)
!=
0
)
{
SYSERROR
(
"Failed bind mounting device %s from host into container"
,
d
->
name
);
if
(
safe_mount
(
hostpath
,
path
,
0
,
MS_BIND
,
NULL
,
rootfs
->
path
?
rootfs
->
mount
:
NULL
)
!=
0
)
{
SYSERROR
(
"Failed bind mounting device %s from host into container"
,
d
->
name
);
return
-
1
;
}
DEBUG
(
"bind mounted
\"
%s
\"
onto
\"
%s
\"
"
,
hostpath
,
path
);
}
else
{
DEBUG
(
"created device node
\"
%s
\"
"
,
path
);
}
}
umask
(
cmask
);
INFO
(
"
P
opulated container /dev"
);
INFO
(
"
p
opulated container /dev"
);
return
0
;
}
...
...
@@ -1481,127 +1484,204 @@ static int setup_personality(int persona)
return
0
;
}
static
int
setup_dev_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
)
static
int
lxc_
setup_dev_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
)
{
char
path
[
MAXPATHLEN
];
int
ret
,
fd
;
if
(
console
->
path
&&
!
strcmp
(
console
->
path
,
"none"
))
return
0
;
ret
=
snprintf
(
path
,
sizeof
(
path
),
"%s/dev/console"
,
rootfs
->
mount
);
if
(
ret
>=
sizeof
(
path
))
{
ERROR
(
"console path too long"
);
if
(
ret
<
0
||
(
size_t
)
ret
>=
sizeof
(
path
))
return
-
1
;
/* When we are asked to setup a console we remove any previous
* /dev/console bind-mounts.
*/
if
(
file_exists
(
path
))
{
ret
=
lxc_unstack_mountpoint
(
path
,
false
);
if
(
ret
<
0
)
{
ERROR
(
"failed to unmount
\"
%s
\"
: %s"
,
path
,
strerror
(
errno
));
return
-
ret
;
}
else
{
DEBUG
(
"cleared all (%d) mounts from
\"
%s
\"
"
,
ret
,
path
);
}
ret
=
unlink
(
path
);
if
(
ret
<
0
)
{
SYSERROR
(
"error unlinking %s"
,
path
);
return
-
errno
;
}
}
/* For unprivileged containers autodev or automounts will already have
* taken care of creating /dev/console.
*/
fd
=
open
(
path
,
O_CREAT
|
O_EXCL
,
S_IXUSR
|
S_IXGRP
|
S_IXOTH
);
if
(
fd
<
0
)
{
if
(
errno
!=
EEXIST
)
{
SYSERROR
(
"failed to create console"
);
return
-
1
;
return
-
errno
;
}
}
else
{
close
(
fd
);
}
if
(
console
->
master
<
0
)
{
INFO
(
"no console"
);
return
0
;
}
if
(
chmod
(
console
->
name
,
S_IXUSR
|
S_IXGRP
|
S_IXOTH
))
{
SYSERROR
(
"failed to set mode '0%o' to '%s'"
,
S_IXUSR
|
S_IXGRP
|
S_IXOTH
,
console
->
name
);
return
-
1
;
SYSERROR
(
"failed to set mode '0%o' to '%s'"
,
S_IXUSR
|
S_IXGRP
|
S_IXOTH
,
console
->
name
);
return
-
errno
;
}
if
(
safe_mount
(
console
->
name
,
path
,
"none"
,
MS_BIND
,
0
,
rootfs
->
mount
))
{
if
(
safe_mount
(
console
->
name
,
path
,
"none"
,
MS_BIND
,
0
,
rootfs
->
mount
)
<
0
)
{
ERROR
(
"failed to mount '%s' on '%s'"
,
console
->
name
,
path
);
return
-
1
;
}
INFO
(
"console has been setup"
);
DEBUG
(
"mounted pts device
\"
%s
\"
onto
\"
%s
\"
"
,
console
->
name
,
path
);
return
0
;
}
static
int
setup_ttydir_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
,
char
*
ttydir
)
static
int
lxc_
setup_ttydir_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
,
char
*
ttydir
)
{
char
path
[
MAXPATHLEN
],
lxcpath
[
MAXPATHLEN
];
int
ret
;
char
path
[
MAXPATHLEN
],
lxcpath
[
MAXPATHLEN
];
/* create rootfs/dev/<ttydir> directory */
ret
=
snprintf
(
path
,
sizeof
(
path
),
"%s/dev/%s"
,
rootfs
->
mount
,
ttydir
);
if
(
ret
>=
sizeof
(
path
))
ret
=
snprintf
(
path
,
sizeof
(
path
),
"%s/dev/%s"
,
rootfs
->
mount
,
ttydir
);
if
(
ret
<
0
||
(
size_t
)
ret
>=
sizeof
(
path
))
return
-
1
;
ret
=
mkdir
(
path
,
0755
);
if
(
ret
&&
errno
!=
EEXIST
)
{
SYSERROR
(
"failed with errno %d to create %s"
,
errno
,
path
);
return
-
1
;
return
-
errno
;
}
INFO
(
"created %s
"
,
path
);
DEBUG
(
"created directory for console and tty devices at \%s
\"
"
,
path
);
ret
=
snprintf
(
lxcpath
,
sizeof
(
lxcpath
),
"%s/dev/%s/console"
,
rootfs
->
mount
,
ttydir
);
if
(
ret
>=
sizeof
(
lxcpath
))
{
ERROR
(
"console path too long"
);
ret
=
snprintf
(
lxcpath
,
sizeof
(
lxcpath
),
"%s/dev/%s/console"
,
rootfs
->
mount
,
ttydir
);
if
(
ret
<
0
||
(
size_t
)
ret
>=
sizeof
(
lxcpath
))
return
-
1
;
}
snprintf
(
path
,
sizeof
(
path
),
"%s/dev/console"
,
rootfs
->
mount
);
ret
=
unlink
(
path
);
if
(
ret
&&
errno
!=
ENOENT
)
{
SYSERROR
(
"error unlinking %s"
,
path
);
return
-
1
;
}
ret
=
creat
(
lxcpath
,
0660
);
if
(
ret
==
-
1
&&
errno
!=
EEXIST
)
{
if
(
ret
==
-
1
&&
errno
!=
EEXIST
)
{
SYSERROR
(
"error %d creating %s"
,
errno
,
lxcpath
);
return
-
1
;
return
-
errno
;
}
if
(
ret
>=
0
)
close
(
ret
);
if
(
console
->
master
<
0
)
{
INFO
(
"no console"
);
return
0
;
}
if
(
safe_mount
(
console
->
name
,
lxcpath
,
"none"
,
MS_BIND
,
0
,
rootfs
->
mount
))
{
ERROR
(
"failed to mount '%s' on '%s'"
,
console
->
name
,
lxcpath
);
ret
=
snprintf
(
path
,
sizeof
(
path
),
"%s/dev/console"
,
rootfs
->
mount
);
if
(
ret
<
0
||
(
size_t
)
ret
>=
sizeof
(
lxcpath
))
return
-
1
;
/* When we are asked to setup a console we remove any previous
* /dev/console bind-mounts.
*/
if
(
console
->
path
&&
!
strcmp
(
console
->
path
,
"none"
))
{
struct
stat
st
;
ret
=
stat
(
path
,
&
st
);
if
(
ret
<
0
)
{
if
(
errno
==
ENOENT
)
return
0
;
SYSERROR
(
"failed stat()
\"
%s
\"
"
,
path
);
return
-
errno
;
}
/* /dev/console must be character device with major number 5 and
* minor number 1. If not, give benefit of the doubt and assume
* the user has mounted something else right there on purpose.
*/
if
(((
st
.
st_mode
&
S_IFMT
)
!=
S_IFCHR
)
||
major
(
st
.
st_rdev
)
!=
5
||
minor
(
st
.
st_rdev
)
!=
1
)
return
0
;
/* In case the user requested a bind-mount for /dev/console and
* requests a ttydir we move the mount to the
* /dev/<ttydir/console.
* Note, we only move the uppermost mount and clear all other
* mounts underneath for safety.
* If it is a character device created via mknod() we simply
* rename it.
*/
ret
=
safe_mount
(
path
,
lxcpath
,
"none"
,
MS_MOVE
,
NULL
,
rootfs
->
mount
);
if
(
ret
<
0
)
{
if
(
errno
!=
EINVAL
)
{
ERROR
(
"failed to MS_MOVE
\"
%s
\"
to
\"
%s
\"
: %s"
,
path
,
lxcpath
,
strerror
(
errno
));
return
-
errno
;
}
/* path was not a mountpoint */
ret
=
rename
(
path
,
lxcpath
);
if
(
ret
<
0
)
{
ERROR
(
"failed to rename
\"
%s
\"
to
\"
%s
\"
: %s"
,
path
,
lxcpath
,
strerror
(
errno
));
return
-
errno
;
}
DEBUG
(
"renamed
\"
%s
\"
to
\"
%s
\"
"
,
path
,
lxcpath
);
}
else
{
DEBUG
(
"moved mount
\"
%s
\"
to
\"
%s
\"
"
,
path
,
lxcpath
);
}
/* Clear all remaining bind-mounts. */
ret
=
lxc_unstack_mountpoint
(
path
,
false
);
if
(
ret
<
0
)
{
ERROR
(
"failed to unmount
\"
%s
\"
: %s"
,
path
,
strerror
(
errno
));
return
-
ret
;
}
else
{
DEBUG
(
"cleared all (%d) mounts from
\"
%s
\"
"
,
ret
,
path
);
}
}
else
{
if
(
file_exists
(
path
))
{
ret
=
lxc_unstack_mountpoint
(
path
,
false
);
if
(
ret
<
0
)
{
ERROR
(
"failed to unmount
\"
%s
\"
: %s"
,
path
,
strerror
(
errno
));
return
-
ret
;
}
else
{
DEBUG
(
"cleared all (%d) mounts from
\"
%s
\"
"
,
ret
,
path
);
}
}
if
(
safe_mount
(
console
->
name
,
lxcpath
,
"none"
,
MS_BIND
,
0
,
rootfs
->
mount
)
<
0
)
{
ERROR
(
"failed to mount '%s' on '%s'"
,
console
->
name
,
lxcpath
);
return
-
1
;
}
DEBUG
(
"mounted
\"
%s
\"
onto
\"
%s
\"
"
,
console
->
name
,
lxcpath
);
}
/* create symlink from rootfs
/dev/console to 'lxc
/console' */
/* create symlink from rootfs
/dev/console to '<ttydir>
/console' */
ret
=
snprintf
(
lxcpath
,
sizeof
(
lxcpath
),
"%s/console"
,
ttydir
);
if
(
ret
>=
sizeof
(
lxcpath
))
{
ERROR
(
"lxc/console path too long"
);
if
(
ret
<
0
||
(
size_t
)
ret
>=
sizeof
(
lxcpath
))
return
-
1
;
ret
=
unlink
(
path
);
if
(
ret
&&
errno
!=
ENOENT
)
{
SYSERROR
(
"error unlinking %s"
,
path
);
return
-
errno
;
}
ret
=
symlink
(
lxcpath
,
path
);
if
(
ret
)
{
SYSERROR
(
"failed to create symlink for console
"
);
if
(
ret
<
0
)
{
SYSERROR
(
"failed to create symlink for console
from
\"
%s
\"
to
\"
%s
\"
"
,
lxcpath
,
path
);
return
-
1
;
}
INFO
(
"console has been setup on %s"
,
lxcpath
);
DEBUG
(
"console has been setup under
\"
%s
\"
and symlinked to
\"
%s
\"
"
,
lxcpath
,
path
);
return
0
;
}
static
int
setup_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
,
char
*
ttydir
)
static
int
lxc_setup_console
(
const
struct
lxc_rootfs
*
rootfs
,
const
struct
lxc_console
*
console
,
char
*
ttydir
)
{
/* We don't have a rootfs, /dev/console will be shared */
if
(
!
rootfs
->
path
)
/* We don't have a rootfs, /dev/console will be shared. */
if
(
!
rootfs
->
path
)
{
DEBUG
(
"/dev/console will be shared with the host"
);
return
0
;
}
if
(
!
ttydir
)
return
setup_dev_console
(
rootfs
,
console
);
return
lxc_
setup_dev_console
(
rootfs
,
console
);
return
setup_ttydir_console
(
rootfs
,
console
,
ttydir
);
return
lxc_
setup_ttydir_console
(
rootfs
,
console
,
ttydir
);
}
static
int
setup_kmsg
(
const
struct
lxc_rootfs
*
rootfs
,
...
...
@@ -4041,19 +4121,17 @@ int lxc_setup(struct lxc_handler *handler)
}
if
(
lxc_conf
->
autodev
>
0
)
{
bool
mount_console
=
lxc_conf
->
console
.
path
&&
!
strcmp
(
lxc_conf
->
console
.
path
,
"none"
);
if
(
run_lxc_hooks
(
name
,
"autodev"
,
lxc_conf
,
lxcpath
,
NULL
))
{
ERROR
(
"failed to run autodev hooks for container '%s'."
,
name
);
return
-
1
;
}
if
(
fill_autodev
(
&
lxc_conf
->
rootfs
,
mount_console
))
{
if
(
lxc_fill_autodev
(
&
lxc_conf
->
rootfs
))
{
ERROR
(
"failed to populate /dev in the container"
);
return
-
1
;
}
}
if
(
!
lxc_conf
->
is_execute
&&
setup_console
(
&
lxc_conf
->
rootfs
,
&
lxc_conf
->
console
,
lxc_conf
->
ttydir
))
{
if
(
!
lxc_conf
->
is_execute
&&
lxc_
setup_console
(
&
lxc_conf
->
rootfs
,
&
lxc_conf
->
console
,
lxc_conf
->
ttydir
))
{
ERROR
(
"failed to setup the console for '%s'"
,
name
);
return
-
1
;
}
...
...
src/lxc/console.c
View file @
eb09dc4e
...
...
@@ -415,16 +415,17 @@ void lxc_console_free(struct lxc_conf *conf, int fd)
}
}
static
void
lxc_console_peer_default
(
struct
lxc_console
*
console
)
static
int
lxc_console_peer_default
(
struct
lxc_console
*
console
)
{
struct
lxc_tty_state
*
ts
;
const
char
*
path
=
console
->
path
;
int
fd
;
int
ret
=
0
;
/*
i
f no console was given, try current controlling terminal, there
* won't be one if we were started as a daemon (-d)
/*
I
f no console was given, try current controlling terminal, there
* won't be one if we were started as a daemon (-d)
.
*/
if
(
!
path
&&
!
access
(
"/dev/tty"
,
F_OK
))
{
int
fd
;
fd
=
open
(
"/dev/tty"
,
O_RDWR
);
if
(
fd
>=
0
)
{
close
(
fd
);
...
...
@@ -432,25 +433,29 @@ static void lxc_console_peer_default(struct lxc_console *console)
}
}
if
(
!
path
)
goto
out
;
DEBUG
(
"opening %s for console peer"
,
path
);
console
->
peer
=
lxc_unpriv
(
open
(
path
,
O_CLOEXEC
|
O_RDWR
|
O_CREAT
|
O_APPEND
,
0600
));
if
(
console
->
peer
<
0
)
if
(
!
path
)
{
errno
=
ENOTTY
;
DEBUG
(
"process does not have a controlling terminal"
);
goto
out
;
}
DEBUG
(
"using '%s' as console"
,
path
);
console
->
peer
=
lxc_unpriv
(
open
(
path
,
O_CLOEXEC
|
O_RDWR
|
O_CREAT
|
O_APPEND
,
0600
));
if
(
console
->
peer
<
0
)
{
ERROR
(
"failed to open
\"
%s
\"
"
,
path
);
return
-
ENOTTY
;
}
DEBUG
(
"using
\"
%s
\"
as peer tty device"
,
path
);
if
(
!
isatty
(
console
->
peer
))
goto
err1
;
if
(
!
isatty
(
console
->
peer
))
{
ERROR
(
"file descriptor for file
\"
%s
\"
does not refer to a tty device"
,
path
);
goto
on_error1
;
}
ts
=
lxc_console_sigwinch_init
(
console
->
peer
,
console
->
master
);
console
->
tty_state
=
ts
;
if
(
!
ts
)
{
WARN
(
"
Unable to install SIGWINCH
"
);
goto
er
r1
;
WARN
(
"
unable to install SIGWINCH handler
"
);
goto
on_erro
r1
;
}
lxc_console_winsz
(
console
->
peer
,
console
->
master
);
...
...
@@ -458,23 +463,27 @@ static void lxc_console_peer_default(struct lxc_console *console)
console
->
tios
=
malloc
(
sizeof
(
*
console
->
tios
));
if
(
!
console
->
tios
)
{
SYSERROR
(
"failed to allocate memory"
);
goto
err1
;
ret
=
-
ENOMEM
;
goto
on_error1
;
}
if
(
lxc_setup_tios
(
console
->
peer
,
console
->
tios
)
<
0
)
goto
er
r2
;
return
;
goto
on_erro
r2
;
else
goto
out
;
er
r2
:
on_erro
r2
:
free
(
console
->
tios
);
console
->
tios
=
NULL
;
err1
:
ret
=
-
ENOTTY
;
on_error1
:
close
(
console
->
peer
);
console
->
peer
=
-
1
;
ret
=
-
ENOTTY
;
out
:
DEBUG
(
"no console peer"
);
return
;
return
ret
;
}
void
lxc_console_delete
(
struct
lxc_console
*
console
)
...
...
@@ -503,21 +512,24 @@ int lxc_console_create(struct lxc_conf *conf)
int
ret
;
if
(
conf
->
is_execute
)
{
INFO
(
"no
consol
e for lxc-execute."
);
INFO
(
"no
t allocating a console devic
e for lxc-execute."
);
return
0
;
}
if
(
!
conf
->
rootfs
.
path
)
if
(
!
conf
->
rootfs
.
path
)
{
INFO
(
"container does not have a rootfs, console device will be shared with the host"
);
return
0
;
}
if
(
console
->
path
&&
!
strcmp
(
console
->
path
,
"none"
))
if
(
console
->
path
&&
!
strcmp
(
console
->
path
,
"none"
))
{
INFO
(
"no console requested"
);
return
0
;
}
process_lock
();
ret
=
openpty
(
&
console
->
master
,
&
console
->
slave
,
console
->
name
,
NULL
,
NULL
);
ret
=
openpty
(
&
console
->
master
,
&
console
->
slave
,
console
->
name
,
NULL
,
NULL
);
process_unlock
();
if
(
ret
)
{
if
(
ret
<
0
)
{
SYSERROR
(
"failed to allocate a pty"
);
return
-
1
;
}
...
...
@@ -532,17 +544,19 @@ int lxc_console_create(struct lxc_conf *conf)
goto
err
;
}
lxc_console_peer_default
(
console
);
ret
=
lxc_console_peer_default
(
console
);
if
(
ret
<
0
)
{
ERROR
(
"failed to allocate peer tty device"
);
goto
err
;
}
if
(
console
->
log_path
)
{
console
->
log_fd
=
lxc_unpriv
(
open
(
console
->
log_path
,
O_CLOEXEC
|
O_RDWR
|
O_CREAT
|
O_APPEND
,
0600
));
console
->
log_fd
=
lxc_unpriv
(
open
(
console
->
log_path
,
O_CLOEXEC
|
O_RDWR
|
O_CREAT
|
O_APPEND
,
0600
));
if
(
console
->
log_fd
<
0
)
{
SYSERROR
(
"failed to open
'%s'
"
,
console
->
log_path
);
SYSERROR
(
"failed to open
console log file
\"
%s
\"
"
,
console
->
log_path
);
goto
err
;
}
DEBUG
(
"using
'%s' as console log
"
,
console
->
log_path
);
DEBUG
(
"using
\"
%s
\"
as console log file
"
,
console
->
log_path
);
}
return
0
;
...
...
src/lxc/utils.c
View file @
eb09dc4e
...
...
@@ -2204,3 +2204,29 @@ on_error:
return
fd_loop
;
}
int
lxc_unstack_mountpoint
(
const
char
*
path
,
bool
lazy
)
{
int
ret
;
int
umounts
=
0
;
pop_stack
:
ret
=
umount2
(
path
,
lazy
?
MNT_DETACH
:
0
);
if
(
ret
<
0
)
{
/* We consider anything else than EINVAL deadly to prevent going
* into an infinite loop. (The other alternative is constantly
* parsing /proc/self/mountinfo which is yucky and probably
* racy.)
*/
if
(
errno
!=
EINVAL
)
return
-
errno
;
}
else
{
/* We succeeded in umounting. Make sure that there's no other
* mountpoint stacked underneath.
*/
umounts
++
;
goto
pop_stack
;
}
return
umounts
;
}
src/lxc/utils.h
View file @
eb09dc4e
...
...
@@ -348,4 +348,11 @@ int lxc_setgroups(int size, gid_t list[]);
/* Find an unused loop device and associate it with source. */
int
lxc_prepare_loop_dev
(
const
char
*
source
,
char
*
loop_dev
,
int
flags
);
/* Clear all mounts on a given node.
* >= 0 successfully cleared. The number returned is the number of umounts
* performed.
* < 0 error umounting. Return -errno.
*/
int
lxc_unstack_mountpoint
(
const
char
*
path
,
bool
lazy
);
#endif
/* __LXC_UTILS_H */
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment