lxc_container.c 17.7 KB
Newer Older
1 2
/*
 * Copyright IBM Corp. 2008
3
 * Copyright Red Hat 2008
4 5 6 7 8
 *
 * lxc_container.c: file description
 *
 * Authors:
 *  David L. Leskovec <dlesko at linux.vnet.ibm.com>
9
 *  Daniel P. Berrange <berrange@redhat.com>
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include <config.h>

#include <fcntl.h>
#include <limits.h>
#include <stdlib.h>
31
#include <stdio.h>
32 33
#include <sys/ioctl.h>
#include <sys/mount.h>
34
#include <sys/wait.h>
35
#include <unistd.h>
36 37 38 39 40 41 42
#include <mntent.h>

/* Yes, we want linux private one, for _syscall2() macro */
#include <linux/unistd.h>

/* For MS_MOVE */
#include <linux/fs.h>
43

44
#include "virterror_internal.h"
45
#include "logging.h"
46 47
#include "lxc_container.h"
#include "util.h"
48
#include "memory.h"
49
#include "veth.h"
50

51 52
#define VIR_FROM_THIS VIR_FROM_LXC

53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
/*
 * GLibc headers are behind the kernel, so we define these
 * constants if they're not present already.
 */

#ifndef CLONE_NEWPID
#define CLONE_NEWPID  0x20000000
#endif
#ifndef CLONE_NEWUTS
#define CLONE_NEWUTS  0x04000000
#endif
#ifndef CLONE_NEWUSER
#define CLONE_NEWUSER 0x10000000
#endif
#ifndef CLONE_NEWIPC
#define CLONE_NEWIPC  0x08000000
#endif
#ifndef CLONE_NEWNET
#define CLONE_NEWNET  0x40000000 /* New network namespace */
#endif

/* messages between parent and container */
typedef char lxc_message_t;
#define LXC_CONTINUE_MSG 'c'

typedef struct __lxc_child_argv lxc_child_argv_t;
struct __lxc_child_argv {
80
    virDomainDefPtr config;
81 82
    unsigned int nveths;
    char **veths;
83 84 85 86 87
    int monitor;
    char *ttyPath;
};


88
/**
89
 * lxcContainerExecInit:
90 91
 * @vmDef: Ptr to vm definition structure
 *
92
 * Exec the container init string. The container init will replace then
93 94
 * be running in the current process
 *
95
 * Does not return
96
 */
97
static int lxcContainerExecInit(virDomainDefPtr vmDef)
98
{
99
    const char *const argv[] = {
100
        vmDef->os.init,
101 102
        NULL,
    };
103

104
    return execve(argv[0], (char **)argv, NULL);
105 106 107
}

/**
108 109 110
 * lxcContainerSetStdio:
 * @control: the conrol FD
 * @ttyPath: Name of tty to set as the container console
111 112 113 114 115 116
 *
 * Sets the given tty as the primary conosole for the container as well as
 * stdout, stdin and stderr.
 *
 * Returns 0 on success or -1 in case of error
 */
117
static int lxcContainerSetStdio(int control, int ttyfd)
118 119
{
    int rc = -1;
120
    int open_max, i;
121 122

    if (setsid() < 0) {
123 124
        virReportSystemError(NULL, errno, "%s",
                             _("setsid failed"));
125
        goto cleanup;
126 127 128
    }

    if (ioctl(ttyfd, TIOCSCTTY, NULL) < 0) {
129 130
        virReportSystemError(NULL, errno, "%s",
                             _("ioctl(TIOCSTTY) failed"));
131 132 133
        goto cleanup;
    }

134 135 136 137
    /* Just in case someone forget to set FD_CLOEXEC, explicitly
     * close all FDs before executing the container */
    open_max = sysconf (_SC_OPEN_MAX);
    for (i = 0; i < open_max; i++)
138
        if (i != ttyfd && i != control)
139
            close(i);
140 141

    if (dup2(ttyfd, 0) < 0) {
142 143
        virReportSystemError(NULL, errno, "%s",
                             _("dup2(stdin) failed"));
144 145 146 147
        goto cleanup;
    }

    if (dup2(ttyfd, 1) < 0) {
148 149
        virReportSystemError(NULL, errno, "%s",
                             _("dup2(stdout) failed"));
150 151 152 153
        goto cleanup;
    }

    if (dup2(ttyfd, 2) < 0) {
154 155
        virReportSystemError(NULL, errno, "%s",
                             _("dup2(stderr) failed"));
156 157 158 159 160 161 162 163 164 165
        goto cleanup;
    }

    rc = 0;

cleanup:
    return rc;
}

/**
166 167
 * lxcContainerSendContinue:
 * @monitor: control FD to child
168
 *
169 170
 * Sends the continue message via the socket pair stored in the vm
 * structure.
171 172 173
 *
 * Returns 0 on success or -1 in case of error
 */
174
int lxcContainerSendContinue(int control)
175 176
{
    int rc = -1;
177 178
    lxc_message_t msg = LXC_CONTINUE_MSG;
    int writeCount = 0;
179

180 181
    writeCount = safewrite(control, &msg, sizeof(msg));
    if (writeCount != sizeof(msg)) {
182 183
        virReportSystemError(NULL, errno, "%s",
                             _("unable to send container continue message"));
184
        goto error_out;
185 186
    }

187
    rc = 0;
188

189 190
error_out:
    return rc;
191 192
}

193
/**
194 195
 * lxcContainerWaitForContinue:
 * @control: control FD from parent
196 197 198 199 200 201 202
 *
 * This function will wait for the container continue message from the
 * parent process.  It will send this message on the socket pair stored in
 * the vm structure once it has completed the post clone container setup.
 *
 * Returns 0 on success or -1 in case of error
 */
203
static int lxcContainerWaitForContinue(int control)
204 205 206 207
{
    lxc_message_t msg;
    int readLen;

208
    readLen = saferead(control, &msg, sizeof(msg));
209 210
    if (readLen != sizeof(msg) ||
        msg != LXC_CONTINUE_MSG) {
211 212
        virReportSystemError(NULL, errno, "%s",
                             _("Failed to read the container continue message"));
213
        return -1;
214
    }
215
    close(control);
216 217 218

    DEBUG0("Received container continue message");

219
    return 0;
220 221
}

222

223 224 225 226 227 228 229 230
/**
 * lxcEnableInterfaces:
 * @vm: Pointer to vm structure
 *
 * This function will enable the interfaces for this container.
 *
 * Returns 0 on success or nonzero in case of error
 */
231 232
static int lxcContainerEnableInterfaces(unsigned int nveths,
                                        char **veths)
233 234
{
    int rc = 0;
235
    unsigned int i;
236

237 238 239
    for (i = 0 ; i < nveths ; i++) {
        DEBUG("Enabling %s", veths[i]);
        rc =  vethInterfaceUpOrDown(veths[i], 1);
240 241 242 243 244 245
        if (0 != rc) {
            goto error_out;
        }
    }

    /* enable lo device only if there were other net devices */
246
    if (veths)
247 248 249 250 251 252
        rc = vethInterfaceUpOrDown("lo", 1);

error_out:
    return rc;
}

253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268

//_syscall2(int, pivot_root, char *, newroot, const char *, oldroot)
extern int pivot_root(const char * new_root,const char * put_old);

static int lxcContainerChildMountSort(const void *a, const void *b)
{
  const char **sa = (const char**)a;
  const char **sb = (const char**)b;

  /* Delibrately reversed args - we need to unmount deepest
     children first */
  return strcmp(*sb, *sa);
}

static int lxcContainerPivotRoot(virDomainFSDefPtr root)
{
269
    int rc;
270 271 272 273 274
    char *oldroot;

    /* First step is to ensure the new root itself is
       a mount point */
    if (mount(root->src, root->src, NULL, MS_BIND, NULL) < 0) {
275 276 277
        virReportSystemError(NULL, errno,
                             _("failed to bind new root %s"),
                             root->src);
278 279 280
        return -1;
    }

281
    if (virAsprintf(&oldroot, "%s/.oldroot", root->src) < 0) {
282
        virReportOOMError(NULL);
283 284 285
        return -1;
    }

286 287 288 289
    if ((rc = virFileMakePath(oldroot)) < 0) {
        virReportSystemError(NULL, rc,
                             _("failed to create %s"),
                             oldroot);
290
        VIR_FREE(oldroot);
291 292 293 294 295 296
        return -1;
    }

    /* The old root directory will live at /.oldroot after
     * this and will soon be unmounted completely */
    if (pivot_root(root->src, oldroot) < 0) {
297 298 299
        virReportSystemError(NULL, errno,
                             _("failed to pivot root %s to %s"),
                             oldroot, root->src);
300
        VIR_FREE(oldroot);
301 302 303 304 305 306 307 308 309 310 311 312 313 314 315
        return -1;
    }
    VIR_FREE(oldroot);

    /* CWD is undefined after pivot_root, so go to / */
    if (chdir("/") < 0) {
        return -1;
    }

    return 0;
}

static int lxcContainerPopulateDevices(void)
{
    int i;
316
    int rc;
317 318 319 320 321 322
    const struct {
        int maj;
        int min;
        mode_t mode;
        const char *path;
    } devs[] = {
D
Dan Smith 已提交
323 324 325 326 327 328
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_NULL, 0666, "/dev/null" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_ZERO, 0666, "/dev/zero" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_FULL, 0666, "/dev/full" },
        { LXC_DEV_MAJ_TTY, LXC_DEV_MIN_CONSOLE, 0600, "/dev/console" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_RANDOM, 0666, "/dev/random" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_URANDOM, 0666, "/dev/urandom" },
329 330
    };

331 332 333 334 335 336 337 338
    if ((rc = virFileMakePath("/dev")) < 0) {
        virReportSystemError(NULL, rc, "%s",
                             _("cannot create /dev/"));
        return -1;
    }
    if (mount("none", "/dev", "tmpfs", 0, NULL) < 0) {
        virReportSystemError(NULL, errno, "%s",
                             _("failed to mount /dev tmpfs"));
339 340 341 342 343 344 345 346
        return -1;
    }
    /* Move old devpts into container, since we have to
       connect to the master ptmx which was opened in
       the parent.
       XXX This sucks, we need to figure out how to get our
       own private devpts for isolation
    */
347 348 349 350 351 352
    if ((rc = virFileMakePath("/dev/pts") < 0)) {
        virReportSystemError(NULL, rc, "%s",
                             _("cannot create /dev/pts"));
        return -1;
    }
    if (mount("/.oldroot/dev/pts", "/dev/pts", NULL,
353
              MS_MOVE, NULL) < 0) {
354 355
        virReportSystemError(NULL, errno, "%s",
                             _("failed to move /dev/pts into container"));
356 357 358 359 360 361 362 363
        return -1;
    }

    /* Populate /dev/ with a few important bits */
    for (i = 0 ; i < ARRAY_CARDINALITY(devs) ; i++) {
        dev_t dev = makedev(devs[i].maj, devs[i].min);
        if (mknod(devs[i].path, 0, dev) < 0 ||
            chmod(devs[i].path, devs[i].mode)) {
364 365 366
            virReportSystemError(NULL, errno,
                                 _("failed to make device %s"),
                                 devs[i].path);
367 368 369 370 371 372 373 374 375 376
            return -1;
        }
    }

    return 0;
}


static int lxcContainerMountNewFS(virDomainDefPtr vmDef)
{
377
    int i;
378 379

    /* Pull in rest of container's mounts */
380
    for (i = 0 ; i < vmDef->nfss ; i++) {
381
        char *src;
382
        if (STREQ(vmDef->fss[i]->dst, "/"))
383 384
            continue;
        // XXX fix
385
        if (vmDef->fss[i]->type != VIR_DOMAIN_FS_TYPE_MOUNT)
386 387
            continue;

388
        if (virAsprintf(&src, "/.oldroot/%s", vmDef->fss[i]->src) < 0) {
389
            virReportOOMError(NULL);
390 391 392
            return -1;
        }

393 394 395 396
        if (virFileMakePath(vmDef->fss[i]->dst) < 0) {
            virReportSystemError(NULL, errno,
                                 _("failed to create %s"),
                                 vmDef->fss[i]->dst);
397
            VIR_FREE(src);
398 399 400 401 402 403 404 405
            return -1;
        }
        if (mount(src, vmDef->fss[i]->dst, NULL, MS_BIND, NULL) < 0) {
            VIR_FREE(src);
            virReportSystemError(NULL, errno,
                                 _("failed to mount %s at %s"),
                                 vmDef->fss[i]->src,
                                 vmDef->fss[i]->dst);
406 407 408 409 410 411 412 413 414 415 416
            return -1;
        }
        VIR_FREE(src);
    }

    return 0;
}


static int lxcContainerUnmountOldFS(void)
{
417
    struct mntent mntent;
418 419 420 421
    char **mounts = NULL;
    int nmounts = 0;
    FILE *procmnt;
    int i;
422
    char mntbuf[1024];
423 424

    if (!(procmnt = setmntent("/proc/mounts", "r"))) {
425 426
        virReportSystemError(NULL, errno, "%s",
                             _("failed to read /proc/mounts"));
427 428
        return -1;
    }
429 430
    while (getmntent_r(procmnt, &mntent, mntbuf, sizeof(mntbuf)) != NULL) {
        if (!STRPREFIX(mntent.mnt_dir, "/.oldroot"))
431 432 433 434
            continue;

        if (VIR_REALLOC_N(mounts, nmounts+1) < 0) {
            endmntent(procmnt);
435
            virReportOOMError(NULL);
436 437
            return -1;
        }
438
        if (!(mounts[nmounts++] = strdup(mntent.mnt_dir))) {
439
            endmntent(procmnt);
440
            virReportOOMError(NULL);
441 442 443 444 445 446 447 448 449 450
            return -1;
        }
    }
    endmntent(procmnt);

    qsort(mounts, nmounts, sizeof(mounts[0]),
          lxcContainerChildMountSort);

    for (i = 0 ; i < nmounts ; i++) {
        if (umount(mounts[i]) < 0) {
451 452 453
            virReportSystemError(NULL, errno,
                                 _("failed to unmount '%s'"),
                                 mounts[i]);
454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475
            return -1;
        }
        VIR_FREE(mounts[i]);
    }
    VIR_FREE(mounts);

    return 0;
}


/* Got a FS mapped to /, we're going the pivot_root
 * approach to do a better-chroot-than-chroot
 * this is based on this thread http://lkml.org/lkml/2008/3/5/29
 */
static int lxcContainerSetupPivotRoot(virDomainDefPtr vmDef,
                                      virDomainFSDefPtr root)
{
    if (lxcContainerPivotRoot(root) < 0)
        return -1;

    if (virFileMakePath("/proc") < 0 ||
        mount("none", "/proc", "proc", 0, NULL) < 0) {
476 477
        virReportSystemError(NULL, errno, "%s",
                             _("failed to mount /proc"));
478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496
        return -1;
    }

    if (lxcContainerPopulateDevices() < 0)
        return -1;

    if (lxcContainerMountNewFS(vmDef) < 0)
        return -1;

    if (lxcContainerUnmountOldFS() < 0)
        return -1;

    return 0;
}

/* Nothing mapped to /, we're using the main root,
   but with extra stuff mapped in */
static int lxcContainerSetupExtraMounts(virDomainDefPtr vmDef)
{
497
    int i;
498

499
    for (i = 0 ; i < vmDef->nfss ; i++) {
500
        // XXX fix to support other mount types
501
        if (vmDef->fss[i]->type != VIR_DOMAIN_FS_TYPE_MOUNT)
502 503
            continue;

504 505
        if (mount(vmDef->fss[i]->src,
                  vmDef->fss[i]->dst,
506 507 508
                  NULL,
                  MS_BIND,
                  NULL) < 0) {
509 510 511 512
            virReportSystemError(NULL, errno,
                                 _("failed to mount %s at %s"),
                                 vmDef->fss[i]->src,
                                 vmDef->fss[i]->dst);
513 514 515 516 517 518
            return -1;
        }
    }

    /* mount /proc */
    if (mount("lxcproc", "/proc", "proc", 0, NULL) < 0) {
519 520
        virReportSystemError(NULL, errno, "%s",
                             _("failed to mount /proc"));
521 522 523 524 525 526 527 528
        return -1;
    }

    return 0;
}

static int lxcContainerSetupMounts(virDomainDefPtr vmDef)
{
529
    int i;
530 531
    virDomainFSDefPtr root = NULL;

532 533
    for (i = 0 ; i < vmDef->nfss ; i++) {
        if (vmDef->fss[i]->type != VIR_DOMAIN_FS_TYPE_MOUNT)
534
            continue;
535 536
        if (STREQ(vmDef->fss[i]->dst, "/"))
            root = vmDef->fss[i];
537 538 539 540 541 542 543 544
    }

    if (root)
        return lxcContainerSetupPivotRoot(vmDef, root);
    else
        return lxcContainerSetupExtraMounts(vmDef);
}

545 546 547 548 549 550 551 552 553 554 555 556
/**
 * lxcChild:
 * @argv: Pointer to container arguments
 *
 * This function is run in the process clone()'d in lxcStartContainer.
 * Perform a number of container setup tasks:
 *     Setup container file system
 *     mount container /proca
 * Then exec's the container init
 *
 * Returns 0 on success or -1 in case of error
 */
557
static int lxcContainerChild( void *data )
558
{
559
    lxc_child_argv_t *argv = data;
560
    virDomainDefPtr vmDef = argv->config;
561
    int ttyfd;
562 563 564

    if (NULL == vmDef) {
        lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
J
Jim Meyering 已提交
565
                 "%s", _("lxcChild() passed invalid vm definition"));
566
        return -1;
567 568
    }

569 570
    if (lxcContainerSetupMounts(vmDef) < 0)
        return -1;
571

572 573
    ttyfd = open(argv->ttyPath, O_RDWR|O_NOCTTY);
    if (ttyfd < 0) {
574 575 576
        virReportSystemError(NULL, errno,
                             _("failed to open %s"),
                             argv->ttyPath);
577
        return -1;
578 579
    }

580 581
    if (lxcContainerSetStdio(argv->monitor, ttyfd) < 0) {
        close(ttyfd);
582
        return -1;
583 584
    }
    close(ttyfd);
585

586
    /* Wait for interface devices to show up */
587 588
    if (lxcContainerWaitForContinue(argv->monitor) < 0)
        return -1;
589 590

    /* enable interfaces */
591
    if (lxcContainerEnableInterfaces(argv->nveths, argv->veths) < 0)
592
        return -1;
593

594
    /* this function will only return if an error occured */
595 596
    return lxcContainerExecInit(vmDef);
}
597

598 599 600 601 602 603 604 605 606
/**
 * lxcContainerStart:
 * @driver: pointer to driver structure
 * @vm: pointer to virtual machine structure
 *
 * Starts a container process by calling clone() with the namespace flags
 *
 * Returns PID of container on success or -1 in case of error
 */
607
int lxcContainerStart(virDomainDefPtr def,
608 609
                      unsigned int nveths,
                      char **veths,
610 611 612 613 614 615 616
                      int control,
                      char *ttyPath)
{
    pid_t pid;
    int flags;
    int stacksize = getpagesize() * 4;
    char *stack, *stacktop;
617
    lxc_child_argv_t args = { def, nveths, veths, control, ttyPath };
618 619 620

    /* allocate a stack for the container */
    if (VIR_ALLOC_N(stack, stacksize) < 0) {
621
        virReportOOMError(NULL);
622 623 624 625 626 627 628 629 630 631 632 633 634 635
        return -1;
    }
    stacktop = stack + stacksize;

    flags = CLONE_NEWPID|CLONE_NEWNS|CLONE_NEWUTS|CLONE_NEWUSER|CLONE_NEWIPC|SIGCHLD;

    if (def->nets != NULL)
        flags |= CLONE_NEWNET;

    pid = clone(lxcContainerChild, stacktop, flags, &args);
    VIR_FREE(stack);
    DEBUG("clone() returned, %d", pid);

    if (pid < 0) {
636 637
        virReportSystemError(NULL, errno, "%s",
                             _("failed to run clone container"));
638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678
        return -1;
    }

    return pid;
}

static int lxcContainerDummyChild(void *argv ATTRIBUTE_UNUSED)
{
    _exit(0);
}

int lxcContainerAvailable(int features)
{
    int flags = CLONE_NEWPID|CLONE_NEWNS|CLONE_NEWUTS|CLONE_NEWUSER|
        CLONE_NEWIPC|SIGCHLD;
    int cpid;
    char *childStack;
    char *stack;
    int childStatus;

    if (features & LXC_CONTAINER_FEATURE_NET)
        flags |= CLONE_NEWNET;

    if (VIR_ALLOC_N(stack, getpagesize() * 4) < 0) {
        DEBUG0("Unable to allocate stack");
        return -1;
    }

    childStack = stack + (getpagesize() * 4);

    cpid = clone(lxcContainerDummyChild, childStack, flags, NULL);
    VIR_FREE(stack);
    if (cpid < 0) {
        DEBUG("clone call returned %s, container support is not enabled",
              strerror(errno));
        return -1;
    } else {
        waitpid(cpid, &childStatus, 0);
    }

    return 0;
679
}