Commit Graph

3337 Commits

Author SHA1 Message Date
Serge Hallyn
d9b32b0900 coverity: don't risk exec()ing NULL
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
2015-06-08 10:37:55 -05:00
Serge Hallyn
17d252a822 coverity: fix use-after-free in cgmanager.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
2015-06-08 10:33:22 -05:00
Stéphane Graber
212bc24189
Fix bdev.h
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 21:45:23 -04:00
Stéphane Graber
c2af52cf52
Revert bdev.h to the way it was
Instead of re-defining MS_ options all over the place, just revert the
last change to bdev.h so we have all the defines in there again.

Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 19:37:59 -04:00
Stéphane Graber
54c0610037
Define MS_RELATIME for Android
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 17:08:11 -04:00
Stéphane Graber
c37ebdc49a
Define MS_REC and MS_SLAVE for Android in bdev.c
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 15:07:08 -04:00
Serge Hallyn
a70a69e8a0 don't dereference a NULL c->lxc_conf
Commit 37cf711b added a destroy hook, but when it checks
at destroy time whether that hook exists, it assumes that
c->lxc_conf is good.  In fact lxc_conf can be NULL, so check
for that.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 14:09:51 -04:00
Tycho Andersen
755fa45300 don't hardcode the path to criu when checking versions
We use the right path when actually execing criu to checkpoint and restore, but
when checking versions we didn't. Let's use the right path.

Reported-by: Dietmar Maurer <dietmar@proxmox.com>
Signed-off-by: Tycho Andersen <tycho.andersen@canonical.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 10:37:30 -04:00
Serge Hallyn
a041127564 detect whether cgmanager_list_controllers is available
and don't use it if not. This fixes failure to build with older
cgmanager.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-03 10:37:27 -04:00
Serge Hallyn
454ec0abc7 api_start: always close fds 0-2 when daemonized
commit 507cee3618 moved the close and re-open of fds 0-2 into
do_start.  But this means that the lxc monitor itself keeps the
caller's fds 0-2 open, which is wrong for daemonized containers.

Closes #548

Reported-by: Mathieu Le Marec - Pasquet <kiorky@cryptelium.net>
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-02 19:05:37 -04:00
Serge Hallyn
27be573155 cgmanager: attach: never use 'all' controller
We were using 'all' controller if current was in all the
same cgroup.  That doesn't suffice.  We'd have to check
the target.  At that point we may as well just attach
controller by controller.

An optimization to consider is to check the /proc/initpid/cgroup
for all identical controllers.  Let's start by just getting it
right.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-02 19:05:22 -04:00
KATOH Yasufumi
de0dc53307 doc: Add the description of lxc.hook.destroy in Japanese lxc.container.conf(5)
Update for commit 37cf711

Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-06-02 19:05:20 -04:00
Tycho Andersen
59c2d40689 c/r: remember to clean up pidfile
When restoring, we didn't clean up the pidfile that criu uses to pass us the
init pid on error or success; let's do that.

Signed-off-by: Tycho Andersen <tycho.andersen@canonical.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-06-02 19:04:23 -04:00
Stéphane Graber
d24095e46a Fix ABI compatibility
Until we bump the SONAME to liblxc2, only symbol additions and struct
member additions are allowed.

Adding struct members in the middle of the struct breaks backward
compatibility.

This commit makes it clear when struct members were added and moves a
few members that were added in the middle of the 1.0 struct to the end
of it.

Note that unfortunately that means we're breaking backward compatibility
between LXC 1.1.0 and the state after this commit, given 1.1 is
reasonably new, this is the least damaging way of fixing the problem.

Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-06-02 19:04:20 -04:00
KATOH Yasufumi
31a882ef3a aufs: Support unprivileged clone, mount
Current aufs supports FS_USERNS_MOUNT by using allow_userns module
parameter. It allows root in userns to mount aufs.

This patch allows an unprivileged container to use aufs. The value of
xino option is changed to /dev/shm/aufs.xino that an unpriv user can
write.

Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-05-26 16:01:28 -04:00
Serge Hallyn
fe44788608 proc update - don't assume we are pid 1
(I erred in the first patch, causing every lxc-attach to unmount the
container-'s /proc)

Since we now use mount_proc_if_needed() from attach, as opposed to only
from start, we cannot assume we are pid 1.  So fix the check for whether
to mount a new proc.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:07:01 -04:00
Serge Hallyn
ced03a017b attach: mount a sane prox for LSM setup
To set lsm labels, a namespace-local proc mount is needed.

If a container does not have a lxc.mount.auto = proc set, then
tasks in the container do not have a correct /proc mount until
init feels like doing the mount.  At startup we handlie this
by mounting a temporary /proc if needed.  We weren't doing this
at attach, though, so that

lxc-start -n $container
lxc-wait -t 5 -s RUNNING -n $container
lxc-attach -n $container -- uname -a

could in a racy way fail with something like

lxc-attach: lsm/apparmor.c: apparmor_process_label_set: 183 No such file or directory - failed to change apparmor profile to lxc-container-default

Thanks to Chris Townsend for finding this bug at
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1452451

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:06:59 -04:00
Bogdan Purcareata
88e3899351 lxc-busybox: Prevent copying binaries from /usr/local to container
On certain systems, some binaries needed by the container features (dropbear,
openssh), may be placed in non-standard (aka non-distribution-managed
locations), such as /usr/local/*, /opt/local/*, etc. Don't copy the respective
binaries in the container and return a clear error why.

The user should only use these binaries if they are installed at system-wide
locations on the host, such as /{s,}bin or /usr/{s,}bin.

v2:
- check that binary paths adhere to /{,usr/}{,s}bin only

Signed-off-by: Bogdan Purcareata <bogdan.purcareata@freescale.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-05-26 13:04:43 -04:00
Bogdan Purcareata
4432b512a2 lxc-busybox: make some OpenSSH tools optional
Currently, when installing OpenSSH in a Busybox container, the template searches
for all the OpenSSH client binaries available in the Debian distro package. The
included tools might differ from distro to distro, so make part of the tools
optional. The mandatory tools, without which installing OpenSSH fails, are
"sshd" for the server and "ssh" and "scp" for the client.

Signed-off-by: Bogdan Purcareata <bogdan.purcareata@freescale.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-05-26 13:04:41 -04:00
KATOH Yasufumi
5a56eeb64d doc: Add the description of macvlan passthru mode in Japanese lxc.container.conf(5)
Update for commit c15ea60

Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:04:26 -04:00
KATOH Yasufumi
3ae656b54b doc: Update the description of -L option in lxc-autostart(1)
Add the description about displaying the value of wait delays for -L
option

Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:01:46 -04:00
KATOH Yasufumi
4db216f75b doc: Fix the mistranslation about lxc.group in Japanese lxc.container.conf(5)
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:01:43 -04:00
S.Çağlar Onur
f85f338a47 enable cgmanager support for Travis CI
Signed-off-by: S.Çağlar Onur <caglar@10ur.org>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 13:01:41 -04:00
Tycho Andersen
4eae405138 c/r: complain when criu isn't exec()'d correctly
Signed-off-by: Tycho Andersen <tycho.andersen@canonical.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
2015-05-26 11:16:29 -04:00
Serge Hallyn
7f7948206b Use 'cgm listcontrollers' list rather than /proc/self/cgroups
to populate the list of subsystems to use.

Cgmanager can be started with some subsystems disabled (i.e.
cgmanager -M cpuset).  If lxc using cgmanager then uses the
/proc/self/cgroup output to determine which controllers to use,
it will fail when trying to do things to cpuset.  Instead, ask
cgmanager which controllers to use.

This still defers (per patch 1/1) to the lxc.cgroup.use values.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 11:14:27 -04:00
Serge Hallyn
cb6d63a7aa make cgmanager follow lxc.cgroup.use
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 11:14:25 -04:00
Serge Hallyn
4295c5de9e lxc-destroy: remove btrfs subvolumes
Doing this requires some btrfs functions from bdev to be used in
utils.c  Because utils.h is imported by lxc_init.c, I had to create
a new initutils.[ch] which are used by both lxc_init.c and utils.c
We could instead put the btrfs functions into utils.c, which would
be a shorter patch, but it really doesn't belong there.  So I went
the other way figuring there may be more such cases coming up of
fns in utils.c needing code from bdev.c which can't go into lxc_init.

Currently, if we detect a btrfs subvolume we just remove it.  The
st_dev on that dir is different, so we cannot detect if this is
bound in from another fs easily.  If we care, we should check
whether this is a mountpoint, this patch doesn't do that.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 11:14:22 -04:00
有张纸
0f541e3313 Update lxc-debian.in
fix "bash: warning: setlocale: LC_ALL: cannot change locale"

Signed-off-by: <feng xiahou xiahoufeng@yahoo.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-26 10:59:16 -04:00
Stéphane Graber
1e2eb3f4e6 Merge pull request #536 from regit/passthru-v1.2
Passthru v1.2
2015-05-25 11:51:07 -04:00
Eric Leblond
c15ea60706 doc: add 'macvlan' 'passthru' mode
This patch also reword the macvlan section which was hard to read.

Signed-off-by: Eric Leblond <eric@regit.org>
2015-05-25 17:42:40 +02:00
Stéphane Graber
fc2d798a90 Merge pull request #522 from ysbnim/master
config : add lxc.hook.destroy option
2015-05-25 11:07:10 -04:00
Stéphane Graber
378da5aa9f Merge pull request #526 from Azendale/master
Change lxc-clone to use 'rsync -aH' instead of just 'rsync -a'
2015-05-25 11:06:07 -04:00
Stéphane Graber
02d25a9ea5
Easy to read tiemstamp in log
Signed-off-by: Gyeongmin Kim <gyeongmintwo@gmail.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-25 11:04:33 -04:00
Eric Leblond
9985416197 macvlan: add 'passthru' mode
In setup where we want to sniff with an IDS from inside a container
we can use the 'passthru' mode of macvlan. This was not accessible
from the config and this patch fixes the issue.

Signed-off-by: Eric Leblond <eric@regit.org>
2015-05-23 17:53:20 +02:00
Serge Hallyn
a73077478d coverity: free 'result' in error case.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
2015-05-17 07:30:57 -05:00
Erik B. Andersen
6a69816295 Change lxc-clone to use 'rsync -aH' instead of just 'rsync -a' for cloning to fix Launchpad Bug #1441307.
Signed-off-by: Erik B. Andersen <erik.b.andersen@gmail.com>
2015-05-14 21:39:57 -07:00
Stéphane Graber
8ec0243d0a Merge pull request #523 from lucaswerkmeister/fix521
Use POSIX-compliant function names in bash completion
2015-05-14 18:16:40 -04:00
Lucas Werkmeister
e0bc106769
Use POSIX-compliant function names in bash completion
When running in posix mode (for example, because it was invoked as `sh`,
or with the --posix option), bash rejects the function names previously
used because they contain hyphens, which are not legal POSIX names, and
exits immediately.

This is a particularly serious problem on a system in which the
following three conditions hold:

1. The `sh` executable is provided by bash, e. g. via a symlink
2. Gnome Display Manager is used to launch X sessions
3. Bash completion is loaded in the (system or user) profile file
   instead of in the bashrc file

In that case, GDM's Xsession script (run with `sh`, i. e., bash in posix
mode) sources the profile files, thus causing the shell to load the bash
completion files. Upon encountering the non-POSIX-compliant function
names, bash would then exit, immediately ending the X session.

Fixes #521.

Signed-off-by: Lucas Werkmeister <mail@lucaswerkmeister.de>
2015-05-14 22:39:06 +02:00
Sungbae Yoo
37cf711b28 config : add lxc.hook.destroy option
Signed-off-by: Sungbae Yoo <sungbae.yoo@samsung.com>
2015-05-14 09:00:35 +09:00
Cyril Bitterich
19fcf68ffb lxc-debian.in: Fixed errors if dbus is not installed
The lxc-debian template debootstraps a minimum debian system which does not contain dbus.
If systemd is used this will result in getty-static.service to be used instead of getty@ .
The systemd default files uses 6 tty's instead of the 4 the script creates.
This will lead to repeated error messages in the systemd journal.

Signed-off-by: Cyril Bitterich <Cyril.Bitterich@1und1.de>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2015-05-12 10:05:47 -04:00
Stéphane Graber
b219dcecd7 Merge pull request #499 from krichter722/gitignore
added build and test results to .gitignore
2015-05-11 20:20:26 +00:00
Karl-Philipp Richter
9cae8ae97d added doc/api/doxygen_sqlite3.db to .gitignore
Signed-off-by: Karl-Philipp Richter <krichter722@aol.de>
2015-05-11 21:59:19 +02:00
Stéphane Graber
6ad27c4282 Merge pull request #504 from thmo/lua53
Fix Lua 5.3 compatibility code.
2015-05-11 18:09:54 +00:00
Stéphane Graber
ae829be398 Merge pull request #498 from brauner/master
Make lxc-checkconfig work with kernel versions > 3
2015-05-11 18:03:09 +00:00
Stéphane Graber
e7831129a2 Merge pull request #486 from dikei/master
Sort the cgroup memory settings before applying.
2015-05-11 17:52:48 +00:00
Serge Hallyn
54c23a6a62 Merge pull request #512 from martinpitt/master
Call /lib/apparmor/profile-load directly instead of the wrapper
2015-05-07 08:55:02 -05:00
Martin Pitt
580f58c79b Call /lib/apparmor/profile-load directly instead of the wrapper
AppArmor ships /lib/apparmor/profile-load. /lib/init/apparmor-profile-load is
merely a wrapper which calls the former, so just call it directly to avoid the
dependency on the wrapper.

LP: #1432683
2015-05-07 13:38:50 +02:00
Kien Truong
365d180a39 Properly free memory of sorted cgroup settings
We need to use lxc_list_for_each_safe, otherwise de-allocation
will fail with a list size bigger than 2. The pointer to the head
of the list also need freeing after we've freed all other elements
of the list.

Signed-off-by: Kien Truong <duckientruong@gmail.com>
2015-05-05 00:22:00 +01:00
Kien Truong
fac7c66386 Check malloc failure when sorting cgroup settings.
Signed-off-by: Kien Truong <duckientruong@gmail.com>
2015-05-05 00:21:59 +01:00
Kien Truong
aaf2683052 Sort the cgroup memory settings before applying.
Add a function to sort the cgroup settings before applying.
Currently, the function will put memory.memsw.limit_in_bytes after
memory.limit_in_bytes setting so the container will start
regardless of the order specified in the input. Fix #453

Signed-off-by: Kien Truong <duckientruong@gmail.com>
2015-05-05 00:21:59 +01:00