]> git.proxmox.com Git - mirror_lxc.git/log
mirror_lxc.git
6 years agoMerge pull request #2101 from tenforward/japanese
Christian Brauner [Mon, 22 Jan 2018 09:13:55 +0000 (10:13 +0100)]
Merge pull request #2101 from tenforward/japanese

doc: Update Japanese lxc-attach(1) and lxc.container.conf(5)

6 years agodoc: Update Japanese lxc-attach(1) and lxc.container.conf(5)
KATOH Yasufumi [Mon, 22 Jan 2018 05:47:48 +0000 (14:47 +0900)]
doc: Update Japanese lxc-attach(1) and lxc.container.conf(5)

* Update for commit ba2be1a (attach: move pty allocation into api)
* Update for commit 5757588 (manpage: correct lxc.log.file conf option)

Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
6 years agoMerge pull request #2097 from mikemccracken/2018-01-19/report-storage-destroy
Christian Brauner [Sat, 20 Jan 2018 05:27:36 +0000 (06:27 +0100)]
Merge pull request #2097 from mikemccracken/2018-01-19/report-storage-destroy

storage: treat return value from ops->destroy as int

6 years agoMerge pull request #2096 from mikemccracken/patch-1
Christian Brauner [Fri, 19 Jan 2018 23:42:16 +0000 (00:42 +0100)]
Merge pull request #2096 from mikemccracken/patch-1

manpage: correct lxc.log.file conf option

6 years agoMerge pull request #2095 from tych0/remove-lxc-init
Christian Brauner [Fri, 19 Jan 2018 17:49:21 +0000 (18:49 +0100)]
Merge pull request #2095 from tych0/remove-lxc-init

unlink lxc-init

6 years agostorage: treat return value from ops->destroy as int
Michael McCracken [Fri, 19 Jan 2018 16:38:36 +0000 (08:38 -0800)]
storage: treat return value from ops->destroy as int

r->ops->destroy() returns an int, -1 on error.
When assigned to a bool, this becomes true and hides errors.

Signed-off-by: Michael McCracken <mikmccra@cisco.com>
6 years agounlink lxc-init
Tycho Andersen [Wed, 20 Dec 2017 17:52:38 +0000 (17:52 +0000)]
unlink lxc-init

It's sort of an implementation detail that this exists at all, and we
should probably not pollute the container's mount tables or FS with this.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agomanpage: correct lxc.log.file conf option
Michael McCracken [Fri, 19 Jan 2018 19:05:26 +0000 (11:05 -0800)]
manpage: correct lxc.log.file conf option

lxc.log.file instead of just lxc.log

Signed-off-by: Michael McCracken <mikmccra@cisco.com>
6 years agoMerge pull request #2094 from tych0/propagate-exit-code
Serge Hallyn [Fri, 19 Jan 2018 04:26:32 +0000 (22:26 -0600)]
Merge pull request #2094 from tych0/propagate-exit-code

Propagate exit code for app containers

6 years agoset exit status to 1 in the unknown si_code case
Tycho Andersen [Fri, 19 Jan 2018 04:23:48 +0000 (04:23 +0000)]
set exit status to 1 in the unknown si_code case

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agolxc-execute: actually exit with the status of the spawned task
Tycho Andersen [Fri, 19 Jan 2018 03:31:33 +0000 (03:31 +0000)]
lxc-execute: actually exit with the status of the spawned task

Now that we have things propagated through init and liblxc correctly, at
least in non-daemon mode, we can exit with the actual exit status of the
task, instead of always succeeding, which is not so helpful.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agostart: don't return false when the container's init exits nonzero
Tycho Andersen [Fri, 19 Jan 2018 03:29:05 +0000 (03:29 +0000)]
start: don't return false when the container's init exits nonzero

This seems slightly counter-intuitive, but IMO it's what we want.
Basically, ->start() should succeed if the container is spawned correctly
(similar to how golang's exec.Cmd.Start() returns nil if the thing spawns
correctly), and users can check error_num (i.e. golang's exec.Cmd.Wait())
to see how it exited.

This preserves previous behavior, which basically was that start was always
successful if the thing actually launched. Since we never kept track of
exit codes, this would always succeed too. Now that we do, it doesn't, and
this change is required.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agoremember the exit code from the init process
Tycho Andersen [Fri, 19 Jan 2018 03:24:59 +0000 (03:24 +0000)]
remember the exit code from the init process

error_num seems to be trying to remember the exit code of the init process,
except that nothing actually keeps track of it anywhere. So, let's add a
field to the handler, so that we can keep track of the process' exit
status, and the propagate it to error_num in struct lxc_container so that
people can use it.

Note that this is a slight behavior change, essentially instead of making
error_num always == the return code from start, now it contains slightly
more useful information (the actual exit status). But, there is only one
internal user of error_num which I'll fix in later in the series, so IMO
this is ok.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agolxc.init: correctly exit with the app's error code
Tycho Andersen [Fri, 19 Jan 2018 03:21:10 +0000 (03:21 +0000)]
lxc.init: correctly exit with the app's error code

Based on the comments in the code (and the have_status flag), the intent
here (and IMO, the desired behavior) should be for init.lxc to propagate
the actual exit code from the real application process up through.
Otherwise, it is swallowed and nobody can access it.

The bug being fixed here is that ret held the correct exit code, but when
it went around the loop again (to wait for other children) ret is
clobbered. Let's save the desired exit status somewhere else, so it can't
get clobbered, and we propagate things correctly.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agofix lxc_error_set_and_log to match the docs
Tycho Andersen [Fri, 19 Jan 2018 03:20:08 +0000 (03:20 +0000)]
fix lxc_error_set_and_log to match the docs

The documentation for this function says if the task was killed by a
signal, the return code will be 128+n, where n is the signal number. Let's
make that actually true.

(We'll use this behavior in later patches.)

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agostart: don't log stop/continue for non-init processes
Tycho Andersen [Fri, 19 Jan 2018 00:50:39 +0000 (00:50 +0000)]
start: don't log stop/continue for non-init processes

This non-init forwarding check should really be before all the log messages
about "init continued" or "init stopped", since they will otherwise lie
about some process that wasn't init being stopped or continued.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agoMerge pull request #2089 from brauner/2018-01-17/restore_blocking_wait
Serge Hallyn [Wed, 17 Jan 2018 23:44:24 +0000 (17:44 -0600)]
Merge pull request #2089 from brauner/2018-01-17/restore_blocking_wait

lxccontainer: restore blocking wait()

6 years agocommands: add LXC_CMD_SERVE_STATE_CLIENTS
Christian Brauner [Wed, 17 Jan 2018 19:46:04 +0000 (20:46 +0100)]
commands: add LXC_CMD_SERVE_STATE_CLIENTS

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agofreezer: non-functional changes
Christian Brauner [Wed, 17 Jan 2018 19:09:13 +0000 (20:09 +0100)]
freezer: non-functional changes

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agolxccontainer: restore blocking wait()
Christian Brauner [Wed, 17 Jan 2018 14:22:36 +0000 (15:22 +0100)]
lxccontainer: restore blocking wait()

Closes #2027.
Closes lxc/go-lxc#98.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2061 from brauner/2017-12-23/attach_allocate_pty_in_api
Serge Hallyn [Wed, 17 Jan 2018 23:42:57 +0000 (17:42 -0600)]
Merge pull request #2061 from brauner/2017-12-23/attach_allocate_pty_in_api

attach: add LXC_ATTACH_ALLOCATE_PTY

6 years agoutils: check suffix length
Christian Brauner [Wed, 17 Jan 2018 11:21:09 +0000 (12:21 +0100)]
utils: check suffix length

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agotest: log error on failure
Christian Brauner [Wed, 17 Jan 2018 10:50:54 +0000 (11:50 +0100)]
test: log error on failure

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoutils: do not rely on unitialized variable
Christian Brauner [Wed, 17 Jan 2018 10:19:05 +0000 (11:19 +0100)]
utils: do not rely on unitialized variable

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2086 from kunkku/alpine-ptrace
Christian Brauner [Tue, 16 Jan 2018 14:25:43 +0000 (15:25 +0100)]
Merge pull request #2086 from kunkku/alpine-ptrace

lxc-alpine: allow retaining sys_ptrace per container

6 years agolxc-alpine: allow retaining sys_ptrace per container
Kaarle Ritvanen [Tue, 16 Jan 2018 13:53:04 +0000 (15:53 +0200)]
lxc-alpine: allow retaining sys_ptrace per container

Signed-off-by: Kaarle Ritvanen <kaarle.ritvanen@datakunkku.fi>
6 years agoMerge pull request #2085 from duguhaotian/master
Christian Brauner [Tue, 16 Jan 2018 09:50:11 +0000 (10:50 +0100)]
Merge pull request #2085 from duguhaotian/master

[console] return wrong console logsize

6 years ago[console] return wrong console logsize
duguhaotian [Tue, 16 Jan 2018 07:31:14 +0000 (15:31 +0800)]
[console] return wrong console logsize

get_config_console_logsize want console.buffer_size not c->autodev

Signed-off-by: duguhaotian <duguhaotian@gmail.com>
6 years agotests: do not call close() on invalid fd
Christian Brauner [Fri, 12 Jan 2018 17:26:40 +0000 (18:26 +0100)]
tests: do not call close() on invalid fd

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: set SFD_CLOEXEC on signal fd
Christian Brauner [Sun, 31 Dec 2017 00:58:16 +0000 (01:58 +0100)]
console: set SFD_CLOEXEC on signal fd

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: non-functional changes
Christian Brauner [Sun, 31 Dec 2017 00:48:01 +0000 (01:48 +0100)]
start: non-functional changes

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agotools: honor --console and --console-log
Christian Brauner [Mon, 25 Dec 2017 00:52:33 +0000 (01:52 +0100)]
tools: honor --console and --console-log

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach: move pty allocation into api
Christian Brauner [Sun, 24 Dec 2017 18:25:34 +0000 (19:25 +0100)]
attach: move pty allocation into api

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach_options: add log_fd argument
Christian Brauner [Tue, 9 Jan 2018 11:27:05 +0000 (12:27 +0100)]
attach_options: add log_fd argument

This will be used to log the output of attach to.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach: minor tweaks
Christian Brauner [Sun, 24 Dec 2017 18:24:35 +0000 (19:24 +0100)]
attach: minor tweaks

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: add lxc_pty_map_ids()
Christian Brauner [Sun, 24 Dec 2017 18:13:54 +0000 (19:13 +0100)]
console: add lxc_pty_map_ids()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: adapt lxc_console_mainloop_add()
Christian Brauner [Sat, 23 Dec 2017 12:25:44 +0000 (13:25 +0100)]
console: adapt lxc_console_mainloop_add()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach: cleanup attach_child_main()
Christian Brauner [Sat, 23 Dec 2017 11:39:52 +0000 (12:39 +0100)]
attach: cleanup attach_child_main()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: add some pty helpers
Christian Brauner [Sat, 23 Dec 2017 11:19:51 +0000 (12:19 +0100)]
console: add some pty helpers

- int lxc_make_controlling_pty()
- int lxc_login_pty()
- void lxc_pty_conf_free()
- void lxc_pty_info_init()
- void lxc_pty_init()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: non-functional changes
Christian Brauner [Sat, 23 Dec 2017 11:03:32 +0000 (12:03 +0100)]
start: non-functional changes

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: move ringbuffer members to anonymous struct
Christian Brauner [Sat, 23 Dec 2017 11:02:45 +0000 (12:02 +0100)]
conf: move ringbuffer members to anonymous struct

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: move pty creation to separate function
Christian Brauner [Sat, 23 Dec 2017 10:59:36 +0000 (11:59 +0100)]
console: move pty creation to separate function

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconfile: improve log messages
Christian Brauner [Tue, 9 Jan 2018 10:20:44 +0000 (11:20 +0100)]
confile: improve log messages

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2080 from tych0/add-idmap-parse-error-message
Christian Brauner [Tue, 9 Jan 2018 10:16:29 +0000 (11:16 +0100)]
Merge pull request #2080 from tych0/add-idmap-parse-error-message

add some idmap parsing error messages

6 years agoadd some idmap parsing error messages
Tycho Andersen [Tue, 9 Jan 2018 00:07:50 +0000 (00:07 +0000)]
add some idmap parsing error messages

otherwise, we just get a return value of false from setting config failure,
with no indication as to what actually failed in the log.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agoMerge pull request #2078 from tych0/usernsexec-exit-status
Christian Brauner [Mon, 8 Jan 2018 16:36:32 +0000 (17:36 +0100)]
Merge pull request #2078 from tych0/usernsexec-exit-status

fix up lxc-usernsexec's exit status

6 years agofix up lxc-usernsexec's exit status
Tycho Andersen [Mon, 8 Jan 2018 16:20:24 +0000 (16:20 +0000)]
fix up lxc-usernsexec's exit status

* exit(1) when there is an option parsing error
* exit(0) when the user explicitly asks for help
* exit(1) when the user specifies an invalid option

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
6 years agoMerge pull request #2077 from lifeng68/Fix_segment_fault
Christian Brauner [Mon, 8 Jan 2018 08:13:51 +0000 (09:13 +0100)]
Merge pull request #2077 from lifeng68/Fix_segment_fault

Add return check for 'lxc_cmd_get_name'

6 years agoAdd return check for 'lxc_cmd_get_name'
LiFeng [Mon, 8 Jan 2018 19:26:00 +0000 (14:26 -0500)]
Add return check for 'lxc_cmd_get_name'

If 'lxc_cmd_get_name' failed and return with NULL, this would cause a segment fault.

Signed-off-by: LiFeng <lifeng68@huawei.com>
6 years agoMerge pull request #2075 from stgraber/master
Christian Brauner [Sat, 6 Jan 2018 09:25:18 +0000 (10:25 +0100)]
Merge pull request #2075 from stgraber/master

lxc_get_version() should show the "-devel" suffix

6 years agoInclude -devel suffix in version string
Stéphane Graber [Fri, 5 Jan 2018 20:20:55 +0000 (15:20 -0500)]
Include -devel suffix in version string

Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
6 years agoFix broken indentation
Stéphane Graber [Fri, 5 Jan 2018 20:19:30 +0000 (15:19 -0500)]
Fix broken indentation

Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
6 years agoMerge pull request #2067 from brauner/2018-01-03/allow_fully_unprivileged_containers
Serge Hallyn [Thu, 4 Jan 2018 16:26:01 +0000 (10:26 -0600)]
Merge pull request #2067 from brauner/2018-01-03/allow_fully_unprivileged_containers

conf: write "deny" to /proc/[pid]/setgroups

6 years agoMerge pull request #2068 from brauner/2018-01-03/cleanup_command_after_revert
Serge Hallyn [Thu, 4 Jan 2018 16:21:17 +0000 (10:21 -0600)]
Merge pull request #2068 from brauner/2018-01-03/cleanup_command_after_revert

commands: fully revert set_running_config_item()

6 years agocgfsng: only establish mapping once
Christian Brauner [Thu, 4 Jan 2018 14:28:12 +0000 (15:28 +0100)]
cgfsng: only establish mapping once

When we deleted cgroups for unprivileged containers we used to allocate a new
mapping and clone a new user namespace each time we delete a cgroup. This of
course meant - on a cgroup v1 system - doing this >= 10 times when all
controllers were used. Let's not to do this and only allocate and establish a
mapping once.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: rework userns_exec_1()
Christian Brauner [Thu, 4 Jan 2018 14:01:06 +0000 (15:01 +0100)]
conf: rework userns_exec_1()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: non-functional changes
Christian Brauner [Thu, 4 Jan 2018 13:59:42 +0000 (14:59 +0100)]
conf: non-functional changes

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: write "deny" to /proc/[pid]/setgroups
Christian Brauner [Wed, 3 Jan 2018 15:28:40 +0000 (16:28 +0100)]
conf: write "deny" to /proc/[pid]/setgroups

When fully unprivileged users run a container that only maps their own {g,u}id
and they do not have access to setuid new{g,u}idmap binaries we will write the
idmapping directly. This however requires us to write "deny" to
/proc/[pid]/setgroups otherwise any write to /proc/[pid]/gid_map will be
denied.

On a sidenote, this patch enables fully unprivileged containers. If you now set
lxc.net.[i].type = empty no privilege whatsoever is required to run a container.

Enhances #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Felix Abecassis <fabecassis@nvidia.com>
Cc: Jonathan Calmels <jcalmels@nvidia.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2069 from stgraber/master
Christian Brauner [Thu, 4 Jan 2018 09:29:43 +0000 (10:29 +0100)]
Merge pull request #2069 from stgraber/master

gentoo: Add support for .xz tarballs

6 years agoMerge pull request #2070 from hallyn/2018-01-03/staticlibcap
Christian Brauner [Thu, 4 Jan 2018 09:29:18 +0000 (10:29 +0100)]
Merge pull request #2070 from hallyn/2018-01-03/staticlibcap

configure.ac: fix the check for static libcap

6 years agoconfigure.ac: fix the check for static libcap
Serge Hallyn [Thu, 4 Jan 2018 03:02:53 +0000 (21:02 -0600)]
configure.ac: fix the check for static libcap

The existing check doesn't work, because when you statically
link a program against libc, any functions not called are not
included.  So cap_init() which we check for is not there in
the built binary.

So instead just check whether a "gcc -lcap -static" works.
If libcap.a is not available it will fail, if it is it will
succeed.

Signed-off-by: Serge Hallyn <shallyn@cisco.com>
6 years agogentoo: Add support for .xz tarballs
Stéphane Graber [Wed, 3 Jan 2018 23:06:33 +0000 (18:06 -0500)]
gentoo: Add support for .xz tarballs

Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
6 years agocommands: fully revert set_running_config_item()
Christian Brauner [Wed, 3 Jan 2018 17:28:58 +0000 (18:28 +0100)]
commands: fully revert set_running_config_item()

The noop implementation is pointless.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2065 from brauner/2017-01-01/revert_set_running_config_item
Stéphane Graber [Wed, 3 Jan 2018 17:12:39 +0000 (12:12 -0500)]
Merge pull request #2065 from brauner/2017-01-01/revert_set_running_config_item

lxccontainer: revert set_running_config_item()

6 years agoMerge pull request #2066 from brauner/2017-01-02/support_no_root_mappings
Serge Hallyn [Wed, 3 Jan 2018 03:42:06 +0000 (21:42 -0600)]
Merge pull request #2066 from brauner/2017-01-02/support_no_root_mappings

Support configurations without root mapping

6 years agoconf: detect if devpts can be mounted with gid=5
Christian Brauner [Tue, 2 Jan 2018 23:11:38 +0000 (00:11 +0100)]
conf: detect if devpts can be mounted with gid=5

Closes #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agocgfsng: use init {g,u}id
Christian Brauner [Tue, 2 Jan 2018 22:41:10 +0000 (23:41 +0100)]
cgfsng: use init {g,u}id

If no id mapping for the container's root id is defined try to us the id
mappings specified via lxc.init.{g,u}id.

Closes #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf{ile}: detect ns{g,u}id mapping for root
Christian Brauner [Tue, 2 Jan 2018 22:27:55 +0000 (23:27 +0100)]
conf{ile}: detect ns{g,u}id mapping for root

Closes #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: adapt userns_exec_1()
Christian Brauner [Tue, 2 Jan 2018 21:31:16 +0000 (22:31 +0100)]
conf: adapt userns_exec_1()

Closes #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconf: adapt idmap helpers
Christian Brauner [Tue, 2 Jan 2018 21:15:17 +0000 (22:15 +0100)]
conf: adapt idmap helpers

- mapped_hostid_entry()
- idmap_add()

Closes #2033.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agolxccontainer: revert set_running_config_item()
Christian Brauner [Mon, 1 Jan 2018 20:56:23 +0000 (21:56 +0100)]
lxccontainer: revert set_running_config_item()

- As discussed we will have a proper API extension that will allow updating
  various parts of a running container. The prior approach wasn't a good idea.

- Revert this is not a problem since we haven't released any version with the
  set_running_config_item() API extension.

- I'm not simply reverting so that master users can still call into new
  liblxc's without crashing the container. This is achieved by keeping the
  commands callback struct member number identical.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2062 from brauner/2017-12-25/capture_output_of_short_lived_init_p...
Serge Hallyn [Sat, 30 Dec 2017 23:27:48 +0000 (17:27 -0600)]
Merge pull request #2062 from brauner/2017-12-25/capture_output_of_short_lived_init_process

mainloop: capture output of short-lived init procs

6 years agomainloop: use epoll_create1(EPOLL_CLOEXEC)
Christian Brauner [Tue, 26 Dec 2017 19:57:12 +0000 (20:57 +0100)]
mainloop: use epoll_create1(EPOLL_CLOEXEC)

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoconsole: do not allow non-pty devices on open()
Christian Brauner [Tue, 26 Dec 2017 17:00:08 +0000 (18:00 +0100)]
console: do not allow non-pty devices on open()

We don't allow non-pty devices anyway so don't let open() create unneeded
files.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: properly cleanup mainloop
Christian Brauner [Tue, 26 Dec 2017 12:45:12 +0000 (13:45 +0100)]
start: properly cleanup mainloop

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2063 from marcosps/lxcconfig_help
Christian Brauner [Sat, 30 Dec 2017 20:05:41 +0000 (21:05 +0100)]
Merge pull request #2063 from marcosps/lxcconfig_help

lxc_config: Add -h and --help flags handler

6 years agolxc_config: Add -h and --help flags handler
Marcos Paulo de Souza [Sat, 30 Dec 2017 18:35:52 +0000 (16:35 -0200)]
lxc_config: Add -h and --help flags handler

As the other tools already handle, show usage message when -h or --help
are used.

Signed-off-by: Marcos Paulo de Souza <marcos.souza.org@gmail.com>
6 years agomainloop: capture output of short-lived init procs
Christian Brauner [Mon, 25 Dec 2017 13:53:40 +0000 (14:53 +0100)]
mainloop: capture output of short-lived init procs

The handler for the signal fd will detect when the init process of a container
has exited and cause the mainloop to close. However, this can happen before the
console handlers - or any other events for that matter - are handled. So in the
case of init exiting we still need to allow for all buffered input to the
console to be handled before exiting. This allows us to capture output from
short-lived init processes.

This is conceptually equivalent to my implementation of ExecReaderToChannel()
https://github.com/lxc/lxd/blob/master/shared/util_linux.go#L527

Closes #1694.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agomainloop: add mainloop macros
Christian Brauner [Mon, 25 Dec 2017 13:52:39 +0000 (14:52 +0100)]
mainloop: add mainloop macros

This makes it clearer why handlers return what value.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2058 from brauner/2017-12-22/bugfixes
Serge Hallyn [Fri, 22 Dec 2017 22:10:14 +0000 (16:10 -0600)]
Merge pull request #2058 from brauner/2017-12-22/bugfixes

start: fix death signal

6 years agostart: handle setting death signal smarter
Christian Brauner [Fri, 22 Dec 2017 21:52:42 +0000 (22:52 +0100)]
start: handle setting death signal smarter

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: fix death signal
Christian Brauner [Fri, 22 Dec 2017 21:17:44 +0000 (22:17 +0100)]
start: fix death signal

On set{g,u}id() the kernel does:

  /* dumpability changes */
if (!uid_eq(old->euid, new->euid) ||
    !gid_eq(old->egid, new->egid) ||
    !uid_eq(old->fsuid, new->fsuid) ||
    !gid_eq(old->fsgid, new->fsgid) ||
    !cred_cap_issubset(old, new)) {
if (task->mm)
set_dumpable(task->mm, suid_dumpable);
task->pdeath_signal = 0;
smp_wmb();
}

which means we need to re-enable the deat signal after the set{g,u}id().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2057 from brauner/2017-12-22/bugfixes
Serge Hallyn [Fri, 22 Dec 2017 19:50:59 +0000 (13:50 -0600)]
Merge pull request #2057 from brauner/2017-12-22/bugfixes

start: simplify cgroup namespace preservation

6 years agostart: simplify cgroup namespace preservation
Christian Brauner [Fri, 22 Dec 2017 16:18:50 +0000 (17:18 +0100)]
start: simplify cgroup namespace preservation

Since we are now dumpable we can open /proc/<child-pid>/ns/cgroup so let's
avoid the overhead of sending around fds.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: make us dumpable
Christian Brauner [Fri, 22 Dec 2017 16:11:45 +0000 (17:11 +0100)]
start: make us dumpable

When set set{u,g}id() the kernel will make us undumpable. This is unnecessary
since we can guarantee that whatever is running inside the child process at
this point this is fully trusted by the parent. Making us dumpable let's users
use debuggers on the child process before the exec as well and also allows us
to open /proc/<child-pid> files in lieu of the child.
Note, that we only need to perform the prctl(PR_SET_DUMPABLE, ...) if our
effective uid on the host is not 0. If our effective uid on the host is 0 then
we will keep all capabilities in the child user namespace across set{g,u}id().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2042 from brauner/2017-12-15/bugfixes
Serge Hallyn [Thu, 21 Dec 2017 22:30:11 +0000 (16:30 -0600)]
Merge pull request #2042 from brauner/2017-12-15/bugfixes

start: tweaks + bugfixes

6 years agoMerge pull request #2052 from brauner/2017-12-19/unprivileged_btrfs_regression
Serge Hallyn [Thu, 21 Dec 2017 22:08:18 +0000 (16:08 -0600)]
Merge pull request #2052 from brauner/2017-12-19/unprivileged_btrfs_regression

btrfs: fix unprivileged snapshot creation

6 years agostart: log closing cmd socket and STOPPED state
Christian Brauner [Sat, 16 Dec 2017 13:39:12 +0000 (14:39 +0100)]
start: log closing cmd socket and STOPPED state

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agostart: use lxc_raw_clone_cb() where possible
Christian Brauner [Fri, 15 Dec 2017 16:42:31 +0000 (17:42 +0100)]
start: use lxc_raw_clone_cb() where possible

This way we can rely on the kernel's copy-on-write support similar to fork().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agonamespace: add lxc_raw_clone_cb()
Christian Brauner [Fri, 15 Dec 2017 16:35:43 +0000 (17:35 +0100)]
namespace: add lxc_raw_clone_cb()

This is a copy-on-write (no stack passed) variant of lxc_clone().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agonamespace: comment lxc_{raw_}clone()
Christian Brauner [Fri, 15 Dec 2017 16:35:07 +0000 (17:35 +0100)]
namespace: comment lxc_{raw_}clone()

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agotree-wide: s/getpid()/lxc_raw_getpid()/g
Christian Brauner [Sat, 16 Dec 2017 01:07:43 +0000 (02:07 +0100)]
tree-wide: s/getpid()/lxc_raw_getpid()/g

This is to avoid bad surprises caused by older glibc's pid cache (up to 2.25)
when using clone().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agonamespace: add lxc_raw_getpid()
Christian Brauner [Sat, 16 Dec 2017 00:23:17 +0000 (01:23 +0100)]
namespace: add lxc_raw_getpid()

Because of older glibc's pid cache (up to 2.25) whenever clone() is called the
child must must retrieve it's own pid via lxc_raw_getpid().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agotests: expand lxc_raw_clone() tests
Christian Brauner [Fri, 15 Dec 2017 16:03:09 +0000 (17:03 +0100)]
tests: expand lxc_raw_clone() tests

- test CLONE_VFORK
- test CLONE_FILES

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2047 from brauner/2017-12-18/attach_lsm_confinement
Serge Hallyn [Thu, 21 Dec 2017 21:56:51 +0000 (15:56 -0600)]
Merge pull request #2047 from brauner/2017-12-18/attach_lsm_confinement

attach: simplify significantly

6 years agoattach: handle /proc with hidepid={1,2} property
Christian Brauner [Wed, 20 Dec 2017 23:42:37 +0000 (00:42 +0100)]
attach: handle /proc with hidepid={1,2} property

Receive fd for LSM security module before we set{g,u}id(). The reason is that
on set{g,u}id() the kernel will a) make us undumpable and b) we will change our
effective uid. This means our effective uid will be different from the
effective uid of the process that created us which means that this processs no
longer has capabilities in our namespace including CAP_SYS_PTRACE. This means
we will not be able to read and /proc/<pid> files for the process anymore when
/proc is mounted with hidepid={1,2}. So let's get the lsm label fd before the
set{g,u}id().

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach: use lxc_raw_clone()
Christian Brauner [Wed, 20 Dec 2017 12:14:33 +0000 (13:14 +0100)]
attach: use lxc_raw_clone()

This let's us simplify the whole file a lot and makes things way clearer. It
also let's us avoid the infamous pid cache.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoattach: simplify significantly
Christian Brauner [Mon, 18 Dec 2017 01:46:10 +0000 (02:46 +0100)]
attach: simplify significantly

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
6 years agoMerge pull request #2055 from marcosps/cgfsng_debug
Christian Brauner [Wed, 20 Dec 2017 13:19:57 +0000 (14:19 +0100)]
Merge pull request #2055 from marcosps/cgfsng_debug

cgfsng: Add new macro to print errors

6 years agoMerge pull request #2013 from 3XX0/oci-dhcp-improvements
Christian Brauner [Wed, 20 Dec 2017 01:48:04 +0000 (02:48 +0100)]
Merge pull request #2013 from 3XX0/oci-dhcp-improvements

Improve the dhclient hook for OCI compat