mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-10-31 10:23:09 +00:00
95b9db4ee2
Currently, we are mixing: #if HAVE_BLAH with #if WITH_BLAH.
Things got way better with Pavel's work on meson, but apparently,
mixing these two lead to confusing and easy to miss bugs (see
31fb929eca
for instance). While we were forced to use HAVE_
prefix with autotools, we are free to chose our own prefix with
meson and since WITH_ prefix appears to be more popular let's use
it everywhere.
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
1535 lines
41 KiB
C
1535 lines
41 KiB
C
/*
|
|
* virprocess.c: interaction with processes
|
|
*
|
|
* Copyright (C) 2010-2015 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <fcntl.h>
|
|
#include <signal.h>
|
|
#ifndef WIN32
|
|
# include <sys/wait.h>
|
|
#endif
|
|
#include <unistd.h>
|
|
#if WITH_SYS_MOUNT_H
|
|
# include <sys/mount.h>
|
|
#endif
|
|
#if WITH_SETRLIMIT
|
|
# include <sys/time.h>
|
|
# include <sys/resource.h>
|
|
#endif
|
|
#if WITH_SCHED_SETSCHEDULER
|
|
# include <sched.h>
|
|
#endif
|
|
|
|
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__) || WITH_BSD_CPU_AFFINITY
|
|
# include <sys/param.h>
|
|
#endif
|
|
|
|
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
|
|
# include <sys/sysctl.h>
|
|
# include <sys/user.h>
|
|
#endif
|
|
|
|
#if WITH_BSD_CPU_AFFINITY
|
|
# include <sys/cpuset.h>
|
|
#endif
|
|
|
|
#ifdef WIN32
|
|
# define WIN32_LEAN_AND_MEAN
|
|
# include <windows.h>
|
|
#endif
|
|
|
|
#include "virprocess.h"
|
|
#include "virerror.h"
|
|
#include "viralloc.h"
|
|
#include "virfile.h"
|
|
#include "virlog.h"
|
|
#include "virutil.h"
|
|
#include "virstring.h"
|
|
#include "vircommand.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
VIR_LOG_INIT("util.process");
|
|
|
|
#ifdef __linux__
|
|
/*
|
|
* Workaround older glibc. While kernel may support the setns
|
|
* syscall, the glibc wrapper might not exist. If that's the
|
|
* case, use our own.
|
|
*/
|
|
# ifndef __NR_setns
|
|
# if defined(__x86_64__)
|
|
# define __NR_setns 308
|
|
# elif defined(__i386__)
|
|
# define __NR_setns 346
|
|
# elif defined(__arm__)
|
|
# define __NR_setns 375
|
|
# elif defined(__aarch64__)
|
|
# define __NR_setns 375
|
|
# elif defined(__powerpc__)
|
|
# define __NR_setns 350
|
|
# elif defined(__s390__)
|
|
# define __NR_setns 339
|
|
# endif
|
|
# endif
|
|
|
|
# ifndef WITH_SETNS
|
|
# if defined(__NR_setns)
|
|
# include <sys/syscall.h>
|
|
|
|
static inline int setns(int fd, int nstype)
|
|
{
|
|
return syscall(__NR_setns, fd, nstype);
|
|
}
|
|
# else /* !__NR_setns */
|
|
# error Please determine the syscall number for setns on your architecture
|
|
# endif
|
|
# endif
|
|
#else /* !__linux__ */
|
|
static inline int setns(int fd G_GNUC_UNUSED, int nstype G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Namespaces are not supported on this platform."));
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
VIR_ENUM_IMPL(virProcessSchedPolicy,
|
|
VIR_PROC_POLICY_LAST,
|
|
"none",
|
|
"batch",
|
|
"idle",
|
|
"fifo",
|
|
"rr",
|
|
);
|
|
|
|
|
|
#ifndef WIN32
|
|
/**
|
|
* virProcessTranslateStatus:
|
|
* @status: child exit status to translate
|
|
*
|
|
* Translate an exit status into a malloc'd string. Generic helper
|
|
* for virCommandRun(), virCommandWait() and virProcessWait()
|
|
* status argument, as well as raw waitpid().
|
|
*/
|
|
char *
|
|
virProcessTranslateStatus(int status)
|
|
{
|
|
char *buf;
|
|
if (WIFEXITED(status)) {
|
|
buf = g_strdup_printf(_("exit status %d"),
|
|
WEXITSTATUS(status));
|
|
} else if (WIFSIGNALED(status)) {
|
|
buf = g_strdup_printf(_("fatal signal %d"),
|
|
WTERMSIG(status));
|
|
} else {
|
|
buf = g_strdup_printf(_("invalid value %d"), status);
|
|
}
|
|
return buf;
|
|
}
|
|
|
|
|
|
/**
|
|
* virProcessAbort:
|
|
* @pid: child process to kill
|
|
*
|
|
* Abort a child process if PID is positive and that child is still
|
|
* running, without issuing any errors or affecting errno. Designed
|
|
* for error paths where some but not all paths to the cleanup code
|
|
* might have started the child process. If @pid is 0 or negative,
|
|
* this does nothing.
|
|
*/
|
|
void
|
|
virProcessAbort(pid_t pid)
|
|
{
|
|
int saved_errno;
|
|
int ret;
|
|
int status;
|
|
g_autofree char *tmp = NULL;
|
|
|
|
if (pid <= 0)
|
|
return;
|
|
|
|
/* See if intermediate process has exited; if not, try a nice
|
|
* SIGTERM followed by a more severe SIGKILL.
|
|
*/
|
|
saved_errno = errno;
|
|
VIR_DEBUG("aborting child process %d", pid);
|
|
while ((ret = waitpid(pid, &status, WNOHANG)) == -1 &&
|
|
errno == EINTR);
|
|
if (ret == pid) {
|
|
tmp = virProcessTranslateStatus(status);
|
|
VIR_DEBUG("process has ended: %s", tmp);
|
|
goto cleanup;
|
|
} else if (ret == 0) {
|
|
VIR_DEBUG("trying SIGTERM to child process %d", pid);
|
|
kill(pid, SIGTERM);
|
|
g_usleep(10 * 1000);
|
|
while ((ret = waitpid(pid, &status, WNOHANG)) == -1 &&
|
|
errno == EINTR);
|
|
if (ret == pid) {
|
|
tmp = virProcessTranslateStatus(status);
|
|
VIR_DEBUG("process has ended: %s", tmp);
|
|
goto cleanup;
|
|
} else if (ret == 0) {
|
|
VIR_DEBUG("trying SIGKILL to child process %d", pid);
|
|
kill(pid, SIGKILL);
|
|
while ((ret = waitpid(pid, &status, 0)) == -1 &&
|
|
errno == EINTR);
|
|
if (ret == pid) {
|
|
tmp = virProcessTranslateStatus(status);
|
|
VIR_DEBUG("process has ended: %s", tmp);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
}
|
|
VIR_DEBUG("failed to reap child %lld, abandoning it", (long long) pid);
|
|
|
|
cleanup:
|
|
errno = saved_errno;
|
|
}
|
|
|
|
|
|
/**
|
|
* virProcessWait:
|
|
* @pid: child to wait on
|
|
* @exitstatus: optional status collection
|
|
* @raw: whether to pass non-normal status back to caller
|
|
*
|
|
* Wait for a child process to complete. If @pid is -1, do nothing, but
|
|
* return -1 (useful for error cleanup, and assumes an earlier message was
|
|
* already issued). All other pids issue an error message on failure.
|
|
*
|
|
* If @exitstatus is NULL, then the child must exit normally with status 0.
|
|
* Otherwise, if @raw is false, the child must exit normally, and
|
|
* @exitstatus will contain the final exit status (no need for the caller
|
|
* to use WEXITSTATUS()). If @raw is true, then the result of waitpid() is
|
|
* returned in @exitstatus, and the caller must use WIFEXITED() and friends
|
|
* to decipher the child's status.
|
|
*
|
|
* Returns 0 on a successful wait. Returns -1 on any error waiting for
|
|
* completion, or if the command completed with a status that cannot be
|
|
* reflected via the choice of @exitstatus and @raw.
|
|
*/
|
|
int
|
|
virProcessWait(pid_t pid, int *exitstatus, bool raw)
|
|
{
|
|
int ret;
|
|
int status;
|
|
g_autofree char *st = NULL;
|
|
|
|
if (pid <= 0) {
|
|
if (pid != -1)
|
|
virReportSystemError(EINVAL, _("unable to wait for process %lld"),
|
|
(long long) pid);
|
|
return -1;
|
|
}
|
|
|
|
/* Wait for intermediate process to exit */
|
|
while ((ret = waitpid(pid, &status, 0)) == -1 &&
|
|
errno == EINTR);
|
|
|
|
if (ret == -1) {
|
|
virReportSystemError(errno, _("unable to wait for process %lld"),
|
|
(long long) pid);
|
|
return -1;
|
|
}
|
|
|
|
if (exitstatus == NULL) {
|
|
if (status != 0)
|
|
goto error;
|
|
} else if (raw) {
|
|
*exitstatus = status;
|
|
} else if (WIFEXITED(status)) {
|
|
*exitstatus = WEXITSTATUS(status);
|
|
} else {
|
|
goto error;
|
|
}
|
|
|
|
return 0;
|
|
|
|
error:
|
|
st = virProcessTranslateStatus(status);
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Child process (%lld) unexpected %s"),
|
|
(long long) pid, NULLSTR(st));
|
|
return -1;
|
|
}
|
|
|
|
#else /* WIN32 */
|
|
|
|
char *
|
|
virProcessTranslateStatus(int status)
|
|
{
|
|
return g_strdup_printf(_("invalid value %d"), status);
|
|
}
|
|
|
|
|
|
void
|
|
virProcessAbort(pid_t pid)
|
|
{
|
|
/* Not yet ported to mingw. Any volunteers? */
|
|
VIR_DEBUG("failed to reap child %lld, abandoning it", (long long)pid);
|
|
}
|
|
|
|
|
|
int
|
|
virProcessWait(pid_t pid, int *exitstatus G_GNUC_UNUSED, bool raw G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, _("unable to wait for process %lld"),
|
|
(long long) pid);
|
|
return -1;
|
|
}
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
|
/* send signal to a single process */
|
|
int virProcessKill(pid_t pid, int sig)
|
|
{
|
|
if (pid <= 1) {
|
|
errno = ESRCH;
|
|
return -1;
|
|
}
|
|
|
|
#ifdef WIN32
|
|
/* Mingw / Windows don't have many signals (AFAIK) */
|
|
switch (sig) {
|
|
case SIGINT:
|
|
/* This does a Ctrl+C equiv */
|
|
if (!GenerateConsoleCtrlEvent(CTRL_C_EVENT, pid)) {
|
|
errno = ESRCH;
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case SIGTERM:
|
|
/* Since TerminateProcess is closer to SIG_KILL, we do
|
|
* a Ctrl+Break equiv which is more pleasant like the
|
|
* good old unix SIGTERM/HUP
|
|
*/
|
|
if (!GenerateConsoleCtrlEvent(CTRL_BREAK_EVENT, pid)) {
|
|
errno = ESRCH;
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
{
|
|
HANDLE proc;
|
|
proc = OpenProcess(PROCESS_TERMINATE, FALSE, pid);
|
|
if (!proc) {
|
|
errno = ESRCH; /* Not entirely accurate, but close enough */
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* TerminateProcess is more or less equiv to SIG_KILL, in that
|
|
* a process can't trap / block it
|
|
*/
|
|
if (sig != 0 && !TerminateProcess(proc, sig)) {
|
|
errno = ESRCH;
|
|
return -1;
|
|
}
|
|
CloseHandle(proc);
|
|
}
|
|
}
|
|
return 0;
|
|
#else
|
|
return kill(pid, sig);
|
|
#endif
|
|
}
|
|
|
|
|
|
/*
|
|
* Try to kill the process and verify it has exited
|
|
*
|
|
* Returns 0 if it was killed gracefully, 1 if it
|
|
* was killed forcibly, -1 if it is still alive,
|
|
* or another error occurred.
|
|
*
|
|
* Callers can proide an extra delay in seconds to
|
|
* wait longer than the default.
|
|
*/
|
|
int
|
|
virProcessKillPainfullyDelay(pid_t pid, bool force, unsigned int extradelay)
|
|
{
|
|
size_t i;
|
|
/* This is in 1/5th seconds since polling is on a 0.2s interval */
|
|
unsigned int polldelay = (force ? 200 : 75) + (extradelay*5);
|
|
const char *signame = "TERM";
|
|
|
|
VIR_DEBUG("vpid=%lld force=%d extradelay=%u",
|
|
(long long)pid, force, extradelay);
|
|
|
|
/* This loop sends SIGTERM, then waits a few iterations (10 seconds)
|
|
* to see if it dies. If the process still hasn't exited, and
|
|
* @force is requested, a SIGKILL will be sent, and this will
|
|
* wait up to 30 seconds more for the process to exit before
|
|
* returning.
|
|
*
|
|
* An extra delay can be passed by the caller for cases that are
|
|
* expected to clean up slower than usual.
|
|
*
|
|
* Note that setting @force could result in dataloss for the process.
|
|
*/
|
|
for (i = 0; i < polldelay; i++) {
|
|
int signum;
|
|
if (i == 0) {
|
|
signum = SIGTERM; /* kindly suggest it should exit */
|
|
} else if (i == 50 && force) {
|
|
VIR_DEBUG("Timed out waiting after SIGTERM to process %lld, "
|
|
"sending SIGKILL", (long long)pid);
|
|
/* No SIGKILL kill on Win32 ! Use SIGABRT instead which our
|
|
* virProcessKill proc will handle more or less like SIGKILL */
|
|
#ifdef WIN32
|
|
signum = SIGABRT; /* kill it after a grace period */
|
|
signame = "ABRT";
|
|
#else
|
|
signum = SIGKILL; /* kill it after a grace period */
|
|
signame = "KILL";
|
|
#endif
|
|
} else {
|
|
signum = 0; /* Just check for existence */
|
|
}
|
|
|
|
if (virProcessKill(pid, signum) < 0) {
|
|
if (errno != ESRCH) {
|
|
virReportSystemError(errno,
|
|
_("Failed to terminate process %lld with SIG%s"),
|
|
(long long)pid, signame);
|
|
return -1;
|
|
}
|
|
return signum == SIGTERM ? 0 : 1;
|
|
}
|
|
|
|
g_usleep(200 * 1000);
|
|
}
|
|
|
|
virReportSystemError(EBUSY,
|
|
_("Failed to terminate process %lld with SIG%s"),
|
|
(long long)pid, signame);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int virProcessKillPainfully(pid_t pid, bool force)
|
|
{
|
|
return virProcessKillPainfullyDelay(pid, force, 0);
|
|
}
|
|
|
|
#if WITH_SCHED_GETAFFINITY
|
|
|
|
int virProcessSetAffinity(pid_t pid, virBitmapPtr map)
|
|
{
|
|
size_t i;
|
|
int numcpus = 1024;
|
|
size_t masklen;
|
|
cpu_set_t *mask;
|
|
|
|
VIR_DEBUG("Set process affinity on %lld", (long long)pid);
|
|
|
|
/* Not only may the statically allocated cpu_set_t be too small,
|
|
* but there is no way to ask the kernel what size is large enough.
|
|
* So you have no option but to pick a size, try, catch EINVAL,
|
|
* enlarge, and re-try.
|
|
*
|
|
* https://lkml.org/lkml/2009/7/28/620
|
|
*/
|
|
realloc:
|
|
masklen = CPU_ALLOC_SIZE(numcpus);
|
|
mask = CPU_ALLOC(numcpus);
|
|
|
|
if (!mask) {
|
|
virReportOOMError();
|
|
return -1;
|
|
}
|
|
|
|
CPU_ZERO_S(masklen, mask);
|
|
for (i = 0; i < virBitmapSize(map); i++) {
|
|
if (virBitmapIsBitSet(map, i))
|
|
CPU_SET_S(i, masklen, mask);
|
|
}
|
|
|
|
if (sched_setaffinity(pid, masklen, mask) < 0) {
|
|
CPU_FREE(mask);
|
|
if (errno == EINVAL &&
|
|
numcpus < (1024 << 8)) { /* 262144 cpus ought to be enough for anyone */
|
|
numcpus = numcpus << 2;
|
|
goto realloc;
|
|
}
|
|
virReportSystemError(errno,
|
|
_("cannot set CPU affinity on process %d"), pid);
|
|
return -1;
|
|
}
|
|
CPU_FREE(mask);
|
|
|
|
return 0;
|
|
}
|
|
|
|
virBitmapPtr
|
|
virProcessGetAffinity(pid_t pid)
|
|
{
|
|
size_t i;
|
|
cpu_set_t *mask;
|
|
size_t masklen;
|
|
size_t ncpus;
|
|
virBitmapPtr ret = NULL;
|
|
|
|
/* 262144 cpus ought to be enough for anyone */
|
|
ncpus = 1024 << 8;
|
|
masklen = CPU_ALLOC_SIZE(ncpus);
|
|
mask = CPU_ALLOC(ncpus);
|
|
|
|
if (!mask) {
|
|
virReportOOMError();
|
|
return NULL;
|
|
}
|
|
|
|
CPU_ZERO_S(masklen, mask);
|
|
|
|
if (sched_getaffinity(pid, masklen, mask) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot get CPU affinity of process %d"), pid);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!(ret = virBitmapNew(ncpus)))
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < ncpus; i++) {
|
|
/* coverity[overrun-local] */
|
|
if (CPU_ISSET_S(i, masklen, mask))
|
|
ignore_value(virBitmapSetBit(ret, i));
|
|
}
|
|
|
|
cleanup:
|
|
CPU_FREE(mask);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#elif defined(WITH_BSD_CPU_AFFINITY)
|
|
|
|
int virProcessSetAffinity(pid_t pid,
|
|
virBitmapPtr map)
|
|
{
|
|
size_t i;
|
|
cpuset_t mask;
|
|
|
|
CPU_ZERO(&mask);
|
|
for (i = 0; i < virBitmapSize(map); i++) {
|
|
if (virBitmapIsBitSet(map, i))
|
|
CPU_SET(i, &mask);
|
|
}
|
|
|
|
if (cpuset_setaffinity(CPU_LEVEL_WHICH, CPU_WHICH_PID, pid,
|
|
sizeof(mask), &mask) != 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot set CPU affinity on process %d"), pid);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
virBitmapPtr
|
|
virProcessGetAffinity(pid_t pid)
|
|
{
|
|
size_t i;
|
|
cpuset_t mask;
|
|
virBitmapPtr ret = NULL;
|
|
|
|
CPU_ZERO(&mask);
|
|
if (cpuset_getaffinity(CPU_LEVEL_WHICH, CPU_WHICH_PID, pid,
|
|
sizeof(mask), &mask) != 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot get CPU affinity of process %d"), pid);
|
|
return NULL;
|
|
}
|
|
|
|
if (!(ret = virBitmapNew(sizeof(mask) * 8)))
|
|
return NULL;
|
|
|
|
for (i = 0; i < sizeof(mask) * 8; i++)
|
|
if (CPU_ISSET(i, &mask))
|
|
ignore_value(virBitmapSetBit(ret, i));
|
|
|
|
return ret;
|
|
}
|
|
|
|
#else /* WITH_SCHED_GETAFFINITY */
|
|
|
|
int virProcessSetAffinity(pid_t pid G_GNUC_UNUSED,
|
|
virBitmapPtr map G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Process CPU affinity is not supported on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
virBitmapPtr
|
|
virProcessGetAffinity(pid_t pid G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Process CPU affinity is not supported on this platform"));
|
|
return NULL;
|
|
}
|
|
#endif /* WITH_SCHED_GETAFFINITY */
|
|
|
|
|
|
int virProcessGetPids(pid_t pid, size_t *npids, pid_t **pids)
|
|
{
|
|
int ret = -1;
|
|
DIR *dir = NULL;
|
|
int value;
|
|
struct dirent *ent;
|
|
g_autofree char *taskPath = NULL;
|
|
|
|
*npids = 0;
|
|
*pids = NULL;
|
|
|
|
taskPath = g_strdup_printf("/proc/%llu/task", (long long)pid);
|
|
|
|
if (virDirOpen(&dir, taskPath) < 0)
|
|
goto cleanup;
|
|
|
|
while ((value = virDirRead(dir, &ent, taskPath)) > 0) {
|
|
long long tmp;
|
|
pid_t tmp_pid;
|
|
|
|
if (virStrToLong_ll(ent->d_name, NULL, 10, &tmp) < 0)
|
|
goto cleanup;
|
|
tmp_pid = tmp;
|
|
|
|
if (VIR_APPEND_ELEMENT(*pids, *npids, tmp_pid) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
if (value < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_DIR_CLOSE(dir);
|
|
if (ret < 0)
|
|
VIR_FREE(*pids);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virProcessGetNamespaces(pid_t pid,
|
|
size_t *nfdlist,
|
|
int **fdlist)
|
|
{
|
|
int ret = -1;
|
|
size_t i = 0;
|
|
const char *ns[] = { "user", "ipc", "uts", "net", "pid", "mnt" };
|
|
|
|
*nfdlist = 0;
|
|
*fdlist = NULL;
|
|
|
|
for (i = 0; i < G_N_ELEMENTS(ns); i++) {
|
|
int fd;
|
|
g_autofree char *nsfile = NULL;
|
|
|
|
nsfile = g_strdup_printf("/proc/%llu/ns/%s", (long long)pid, ns[i]);
|
|
|
|
if ((fd = open(nsfile, O_RDONLY)) >= 0) {
|
|
if (VIR_EXPAND_N(*fdlist, *nfdlist, 1) < 0) {
|
|
VIR_FORCE_CLOSE(fd);
|
|
goto cleanup;
|
|
}
|
|
|
|
(*fdlist)[(*nfdlist)-1] = fd;
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
if (ret < 0) {
|
|
for (i = 0; i < *nfdlist; i++)
|
|
VIR_FORCE_CLOSE((*fdlist)[i]);
|
|
VIR_FREE(*fdlist);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virProcessSetNamespaces(size_t nfdlist,
|
|
int *fdlist)
|
|
{
|
|
size_t i;
|
|
|
|
if (nfdlist == 0) {
|
|
virReportInvalidArg(nfdlist, "%s",
|
|
_("Expected at least one file descriptor"));
|
|
return -1;
|
|
}
|
|
for (i = 0; i < nfdlist; i++) {
|
|
if (fdlist[i] < 0)
|
|
continue;
|
|
|
|
/* We get EINVAL if new NS is same as the current
|
|
* NS, or if the fd namespace doesn't match the
|
|
* type passed to setns()'s second param. Since we
|
|
* pass 0, we know the EINVAL is harmless
|
|
*/
|
|
if (setns(fdlist[i], 0) < 0 &&
|
|
errno != EINVAL) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to join domain namespace"));
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#if WITH_PRLIMIT
|
|
static int
|
|
virProcessPrLimit(pid_t pid,
|
|
int resource,
|
|
const struct rlimit *new_limit,
|
|
struct rlimit *old_limit)
|
|
{
|
|
return prlimit(pid, resource, new_limit, old_limit);
|
|
}
|
|
#elif WITH_SETRLIMIT
|
|
static int
|
|
virProcessPrLimit(pid_t pid G_GNUC_UNUSED,
|
|
int resource G_GNUC_UNUSED,
|
|
const struct rlimit *new_limit G_GNUC_UNUSED,
|
|
struct rlimit *old_limit G_GNUC_UNUSED)
|
|
{
|
|
errno = ENOSYS;
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
#if WITH_SETRLIMIT && defined(RLIMIT_MEMLOCK)
|
|
int
|
|
virProcessSetMaxMemLock(pid_t pid, unsigned long long bytes)
|
|
{
|
|
struct rlimit rlim;
|
|
|
|
if (bytes == 0)
|
|
return 0;
|
|
|
|
/* We use VIR_DOMAIN_MEMORY_PARAM_UNLIMITED internally to represent
|
|
* unlimited memory amounts, but setrlimit() and prlimit() use
|
|
* RLIM_INFINITY for the same purpose, so we need to translate between
|
|
* the two conventions */
|
|
if (virMemoryLimitIsSet(bytes))
|
|
rlim.rlim_cur = rlim.rlim_max = bytes;
|
|
else
|
|
rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
|
|
|
|
if (pid == 0) {
|
|
if (setrlimit(RLIMIT_MEMLOCK, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit locked memory to %llu"),
|
|
bytes);
|
|
return -1;
|
|
}
|
|
} else {
|
|
if (virProcessPrLimit(pid, RLIMIT_MEMLOCK, &rlim, NULL) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit locked memory "
|
|
"of process %lld to %llu"),
|
|
(long long int)pid, bytes);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
VIR_DEBUG("Locked memory for process %lld limited to %llu bytes",
|
|
(long long int) pid, bytes);
|
|
|
|
return 0;
|
|
}
|
|
#else /* ! (WITH_SETRLIMIT && defined(RLIMIT_MEMLOCK)) */
|
|
int
|
|
virProcessSetMaxMemLock(pid_t pid G_GNUC_UNUSED, unsigned long long bytes)
|
|
{
|
|
if (bytes == 0)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s", _("Not supported on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! (WITH_SETRLIMIT && defined(RLIMIT_MEMLOCK)) */
|
|
|
|
#if WITH_GETRLIMIT && defined(RLIMIT_MEMLOCK)
|
|
int
|
|
virProcessGetMaxMemLock(pid_t pid,
|
|
unsigned long long *bytes)
|
|
{
|
|
struct rlimit rlim;
|
|
|
|
if (!bytes)
|
|
return 0;
|
|
|
|
if (pid == 0) {
|
|
if (getrlimit(RLIMIT_MEMLOCK, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
"%s",
|
|
_("cannot get locked memory limit"));
|
|
return -1;
|
|
}
|
|
} else {
|
|
if (virProcessPrLimit(pid, RLIMIT_MEMLOCK, NULL, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot get locked memory limit "
|
|
"of process %lld"),
|
|
(long long int) pid);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
/* virProcessSetMaxMemLock() sets both rlim_cur and rlim_max to the
|
|
* same value, so we can retrieve just rlim_max here. We use
|
|
* VIR_DOMAIN_MEMORY_PARAM_UNLIMITED internally to represent unlimited
|
|
* memory amounts, but setrlimit() and prlimit() use RLIM_INFINITY for the
|
|
* same purpose, so we need to translate between the two conventions */
|
|
if (rlim.rlim_max == RLIM_INFINITY)
|
|
*bytes = VIR_DOMAIN_MEMORY_PARAM_UNLIMITED;
|
|
else
|
|
*bytes = rlim.rlim_max;
|
|
|
|
return 0;
|
|
}
|
|
#else /* ! (WITH_GETRLIMIT && defined(RLIMIT_MEMLOCK)) */
|
|
int
|
|
virProcessGetMaxMemLock(pid_t pid G_GNUC_UNUSED,
|
|
unsigned long long *bytes)
|
|
{
|
|
if (!bytes)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s", _("Not supported on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! (WITH_GETRLIMIT && defined(RLIMIT_MEMLOCK)) */
|
|
|
|
#if WITH_SETRLIMIT && defined(RLIMIT_NPROC)
|
|
int
|
|
virProcessSetMaxProcesses(pid_t pid, unsigned int procs)
|
|
{
|
|
struct rlimit rlim;
|
|
|
|
if (procs == 0)
|
|
return 0;
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = procs;
|
|
if (pid == 0) {
|
|
if (setrlimit(RLIMIT_NPROC, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit number of subprocesses to %u"),
|
|
procs);
|
|
return -1;
|
|
}
|
|
} else {
|
|
if (virProcessPrLimit(pid, RLIMIT_NPROC, &rlim, NULL) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit number of subprocesses "
|
|
"of process %lld to %u"),
|
|
(long long int)pid, procs);
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
#else /* ! (WITH_SETRLIMIT && defined(RLIMIT_NPROC)) */
|
|
int
|
|
virProcessSetMaxProcesses(pid_t pid G_GNUC_UNUSED, unsigned int procs)
|
|
{
|
|
if (procs == 0)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s", _("Not supported on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! (WITH_SETRLIMIT && defined(RLIMIT_NPROC)) */
|
|
|
|
#if WITH_SETRLIMIT && defined(RLIMIT_NOFILE)
|
|
int
|
|
virProcessSetMaxFiles(pid_t pid, unsigned int files)
|
|
{
|
|
struct rlimit rlim;
|
|
|
|
if (files == 0)
|
|
return 0;
|
|
|
|
/* Max number of opened files is one greater than actual limit. See
|
|
* man setrlimit.
|
|
*
|
|
* NB: That indicates to me that we would want the following code
|
|
* to say "files - 1", but the original of this code in
|
|
* qemu_process.c also had files + 1, so this preserves current
|
|
* behavior.
|
|
*/
|
|
rlim.rlim_cur = rlim.rlim_max = files + 1;
|
|
if (pid == 0) {
|
|
if (setrlimit(RLIMIT_NOFILE, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit number of open files to %u"),
|
|
files);
|
|
return -1;
|
|
}
|
|
} else {
|
|
if (virProcessPrLimit(pid, RLIMIT_NOFILE, &rlim, NULL) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit number of open files "
|
|
"of process %lld to %u"),
|
|
(long long int)pid, files);
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
#else /* ! (WITH_SETRLIMIT && defined(RLIMIT_NOFILE)) */
|
|
int
|
|
virProcessSetMaxFiles(pid_t pid G_GNUC_UNUSED, unsigned int files)
|
|
{
|
|
if (files == 0)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s", _("Not supported on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! (WITH_SETRLIMIT && defined(RLIMIT_NOFILE)) */
|
|
|
|
#if WITH_SETRLIMIT && defined(RLIMIT_CORE)
|
|
int
|
|
virProcessSetMaxCoreSize(pid_t pid, unsigned long long bytes)
|
|
{
|
|
struct rlimit rlim;
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = bytes;
|
|
if (pid == 0) {
|
|
if (setrlimit(RLIMIT_CORE, &rlim) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit core file size to %llu"),
|
|
bytes);
|
|
return -1;
|
|
}
|
|
} else {
|
|
if (virProcessPrLimit(pid, RLIMIT_CORE, &rlim, NULL) < 0) {
|
|
virReportSystemError(errno,
|
|
_("cannot limit core file size "
|
|
"of process %lld to %llu"),
|
|
(long long int)pid, bytes);
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
#else /* ! (WITH_SETRLIMIT && defined(RLIMIT_CORE)) */
|
|
int
|
|
virProcessSetMaxCoreSize(pid_t pid G_GNUC_UNUSED,
|
|
unsigned long long bytes)
|
|
{
|
|
if (bytes == 0)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s", _("Not supported on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! (WITH_SETRLIMIT && defined(RLIMIT_CORE)) */
|
|
|
|
|
|
#ifdef __linux__
|
|
/*
|
|
* Port of code from polkitunixprocess.c under terms
|
|
* of the LGPLv2+
|
|
*/
|
|
int virProcessGetStartTime(pid_t pid,
|
|
unsigned long long *timestamp)
|
|
{
|
|
char *tmp;
|
|
int len;
|
|
g_autofree char *filename = NULL;
|
|
g_autofree char *buf = NULL;
|
|
VIR_AUTOSTRINGLIST tokens = NULL;
|
|
|
|
filename = g_strdup_printf("/proc/%llu/stat", (long long)pid);
|
|
|
|
if ((len = virFileReadAll(filename, 1024, &buf)) < 0)
|
|
return -1;
|
|
|
|
/* start time is the token at index 19 after the '(process name)' entry - since only this
|
|
* field can contain the ')' character, search backwards for this to avoid malicious
|
|
* processes trying to fool us
|
|
*/
|
|
|
|
if (!(tmp = strrchr(buf, ')'))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Cannot find start time in %s"),
|
|
filename);
|
|
return -1;
|
|
}
|
|
tmp += 2; /* skip ') ' */
|
|
if ((tmp - buf) >= len) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Cannot find start time in %s"),
|
|
filename);
|
|
return -1;
|
|
}
|
|
|
|
tokens = virStringSplit(tmp, " ", 0);
|
|
|
|
if (virStringListLength((const char * const *)tokens) < 20) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Cannot find start time in %s"),
|
|
filename);
|
|
return -1;
|
|
}
|
|
|
|
if (virStrToLong_ull(tokens[19],
|
|
NULL,
|
|
10,
|
|
timestamp) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Cannot parse start time %s in %s"),
|
|
tokens[19], filename);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
|
|
int virProcessGetStartTime(pid_t pid,
|
|
unsigned long long *timestamp)
|
|
{
|
|
struct kinfo_proc p;
|
|
int mib[4];
|
|
size_t len = 4;
|
|
|
|
sysctlnametomib("kern.proc.pid", mib, &len);
|
|
|
|
len = sizeof(struct kinfo_proc);
|
|
mib[3] = pid;
|
|
|
|
if (sysctl(mib, 4, &p, &len, NULL, 0) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to query process ID start time"));
|
|
return -1;
|
|
}
|
|
|
|
*timestamp = (unsigned long long)p.ki_start.tv_sec;
|
|
|
|
return 0;
|
|
|
|
}
|
|
#else
|
|
int virProcessGetStartTime(pid_t pid,
|
|
unsigned long long *timestamp)
|
|
{
|
|
static int warned;
|
|
if (g_atomic_int_add(&warned, 1) == 0) {
|
|
VIR_WARN("Process start time of pid %lld not available on this platform",
|
|
(long long) pid);
|
|
}
|
|
*timestamp = 0;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
|
|
#ifdef __linux__
|
|
typedef struct _virProcessNamespaceHelperData virProcessNamespaceHelperData;
|
|
struct _virProcessNamespaceHelperData {
|
|
pid_t pid;
|
|
virProcessNamespaceCallback cb;
|
|
void *opaque;
|
|
};
|
|
|
|
static int virProcessNamespaceHelper(pid_t pid G_GNUC_UNUSED,
|
|
void *opaque)
|
|
{
|
|
virProcessNamespaceHelperData *data = opaque;
|
|
int fd = -1;
|
|
int ret = -1;
|
|
g_autofree char *path = NULL;
|
|
|
|
path = g_strdup_printf("/proc/%lld/ns/mnt", (long long)data->pid);
|
|
|
|
if ((fd = open(path, O_RDONLY)) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Kernel does not provide mount namespace"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (setns(fd, 0) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to enter mount namespace"));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = data->cb(data->pid, data->opaque);
|
|
|
|
cleanup:
|
|
VIR_FORCE_CLOSE(fd);
|
|
return ret;
|
|
}
|
|
|
|
/* Run cb(opaque) in the mount namespace of pid. Return -1 with error
|
|
* message raised if we fail to run the child, if the child dies from
|
|
* a signal, or if the child has status EXIT_CANCELED; otherwise return
|
|
* the exit status of the child. The callback will be run in a child
|
|
* process so must be careful to only use async signal safe functions.
|
|
*/
|
|
int
|
|
virProcessRunInMountNamespace(pid_t pid,
|
|
virProcessNamespaceCallback cb,
|
|
void *opaque)
|
|
{
|
|
virProcessNamespaceHelperData data = {.pid = pid, .cb = cb, .opaque = opaque};
|
|
|
|
return virProcessRunInFork(virProcessNamespaceHelper, &data);
|
|
}
|
|
|
|
#else /* ! __linux__ */
|
|
|
|
int
|
|
virProcessRunInMountNamespace(pid_t pid G_GNUC_UNUSED,
|
|
virProcessNamespaceCallback cb G_GNUC_UNUSED,
|
|
void *opaque G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Namespaces are not supported on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
#endif /* ! __linux__ */
|
|
|
|
|
|
#ifndef WIN32
|
|
typedef struct {
|
|
int code;
|
|
int domain;
|
|
char message[VIR_ERROR_MAX_LENGTH];
|
|
virErrorLevel level;
|
|
char str1[VIR_ERROR_MAX_LENGTH];
|
|
char str2[VIR_ERROR_MAX_LENGTH];
|
|
char str3[VIR_ERROR_MAX_LENGTH];
|
|
int int1;
|
|
int int2;
|
|
} errorData;
|
|
|
|
typedef union {
|
|
errorData data;
|
|
char bindata[sizeof(errorData)];
|
|
} errorDataBin;
|
|
|
|
static int
|
|
virProcessRunInForkHelper(int errfd,
|
|
pid_t ppid,
|
|
virProcessForkCallback cb,
|
|
void *opaque)
|
|
{
|
|
if (cb(ppid, opaque) < 0) {
|
|
virErrorPtr err = virGetLastError();
|
|
|
|
if (err) {
|
|
g_autofree errorDataBin *bin = g_new0(errorDataBin, 1);
|
|
|
|
bin->data.code = err->code;
|
|
bin->data.domain = err->domain;
|
|
ignore_value(virStrcpy(bin->data.message, err->message, sizeof(bin->data.message)));
|
|
bin->data.level = err->level;
|
|
if (err->str1)
|
|
ignore_value(virStrcpy(bin->data.str1, err->str1, sizeof(bin->data.str1)));
|
|
if (err->str2)
|
|
ignore_value(virStrcpy(bin->data.str2, err->str2, sizeof(bin->data.str2)));
|
|
if (err->str3)
|
|
ignore_value(virStrcpy(bin->data.str3, err->str3, sizeof(bin->data.str3)));
|
|
bin->data.int1 = err->int1;
|
|
bin->data.int2 = err->int2;
|
|
|
|
ignore_value(safewrite(errfd, bin->bindata, sizeof(*bin)));
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virProcessRunInFork:
|
|
* @cb: callback to run
|
|
* @opaque: opaque data to @cb
|
|
*
|
|
* Do the fork and run @cb in the child. This can be used when
|
|
* @cb does something thread unsafe, for instance. All signals
|
|
* will be reset to have their platform default handlers and
|
|
* unmasked. @cb must only use async signal safe functions. In
|
|
* particular no mutexes should be used in @cb, unless steps were
|
|
* taken before forking to guarantee a predictable state. @cb
|
|
* must not exec any external binaries, instead
|
|
* virCommand should be used for that purpose.
|
|
*
|
|
* On return, the returned value is either -1 with error message
|
|
* reported if something went bad in the parent, if child has
|
|
* died from a signal or if the child returned EXIT_CANCELED.
|
|
* Otherwise the returned value is the exit status of the child.
|
|
*/
|
|
int
|
|
virProcessRunInFork(virProcessForkCallback cb,
|
|
void *opaque)
|
|
{
|
|
int ret = -1;
|
|
pid_t child = -1;
|
|
pid_t parent = getpid();
|
|
int errfd[2] = { -1, -1 };
|
|
|
|
if (virPipe(errfd) < 0)
|
|
return -1;
|
|
|
|
if ((child = virFork()) < 0)
|
|
goto cleanup;
|
|
|
|
if (child == 0) {
|
|
VIR_FORCE_CLOSE(errfd[0]);
|
|
ret = virProcessRunInForkHelper(errfd[1], parent, cb, opaque);
|
|
VIR_FORCE_CLOSE(errfd[1]);
|
|
_exit(ret < 0 ? EXIT_CANCELED : ret);
|
|
} else {
|
|
int status;
|
|
g_autofree char *buf = NULL;
|
|
g_autofree errorDataBin *bin = NULL;
|
|
int nread;
|
|
|
|
VIR_FORCE_CLOSE(errfd[1]);
|
|
nread = virFileReadHeaderFD(errfd[0], sizeof(*bin), &buf);
|
|
ret = virProcessWait(child, &status, false);
|
|
if (ret == 0) {
|
|
ret = status == EXIT_CANCELED ? -1 : status;
|
|
if (ret) {
|
|
if (nread == sizeof(*bin)) {
|
|
bin = g_new0(errorDataBin, 1);
|
|
memcpy(bin->bindata, buf, sizeof(*bin));
|
|
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("child reported (status=%d): %s"),
|
|
status, NULLSTR(bin->data.message));
|
|
|
|
virRaiseErrorFull(__FILE__, __FUNCTION__, __LINE__,
|
|
bin->data.domain,
|
|
bin->data.code,
|
|
bin->data.level,
|
|
bin->data.str1,
|
|
bin->data.str2,
|
|
bin->data.str3,
|
|
bin->data.int1,
|
|
bin->data.int2,
|
|
"%s", bin->data.message);
|
|
} else {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("child didn't write error (status=%d)"),
|
|
status);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
VIR_FORCE_CLOSE(errfd[0]);
|
|
VIR_FORCE_CLOSE(errfd[1]);
|
|
return ret;
|
|
}
|
|
|
|
#else /* WIN32 */
|
|
|
|
int
|
|
virProcessRunInFork(virProcessForkCallback cb G_GNUC_UNUSED,
|
|
void *opaque G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Process spawning is not supported on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
|
#if defined(__linux__)
|
|
int
|
|
virProcessSetupPrivateMountNS(void)
|
|
{
|
|
if (unshare(CLONE_NEWNS) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Cannot unshare mount namespace"));
|
|
return -1;
|
|
}
|
|
|
|
if (mount("", "/", "none", MS_SLAVE|MS_REC, NULL) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Failed disable mount propagation out of the root filesystem"));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
G_GNUC_NORETURN static int
|
|
virProcessDummyChild(void *argv G_GNUC_UNUSED)
|
|
{
|
|
_exit(0);
|
|
}
|
|
|
|
|
|
/**
|
|
* virProcessNamespaceAvailable:
|
|
* @ns: what namespaces to check (bitwise-OR of virProcessNamespaceFlags)
|
|
*
|
|
* Check if given list of namespaces (@ns) is available.
|
|
* If not, appropriate error message is produced.
|
|
*
|
|
* Returns: 0 on success (all the namespaces from @flags are available),
|
|
* -1 on error (with error message reported).
|
|
*/
|
|
int
|
|
virProcessNamespaceAvailable(unsigned int ns)
|
|
{
|
|
int flags = 0;
|
|
int cpid;
|
|
char *childStack;
|
|
int stacksize = getpagesize() * 4;
|
|
g_autofree char *stack = NULL;
|
|
|
|
if (ns & VIR_PROCESS_NAMESPACE_MNT)
|
|
flags |= CLONE_NEWNS;
|
|
if (ns & VIR_PROCESS_NAMESPACE_IPC)
|
|
flags |= CLONE_NEWIPC;
|
|
if (ns & VIR_PROCESS_NAMESPACE_NET)
|
|
flags |= CLONE_NEWNET;
|
|
if (ns & VIR_PROCESS_NAMESPACE_PID)
|
|
flags |= CLONE_NEWPID;
|
|
if (ns & VIR_PROCESS_NAMESPACE_USER)
|
|
flags |= CLONE_NEWUSER;
|
|
if (ns & VIR_PROCESS_NAMESPACE_UTS)
|
|
flags |= CLONE_NEWUTS;
|
|
|
|
/* Signal parent as soon as the child dies. RIP. */
|
|
flags |= SIGCHLD;
|
|
|
|
if (VIR_ALLOC_N(stack, stacksize) < 0)
|
|
return -1;
|
|
|
|
childStack = stack + stacksize;
|
|
|
|
cpid = clone(virProcessDummyChild, childStack, flags, NULL);
|
|
|
|
if (cpid < 0) {
|
|
VIR_DEBUG("clone call returned %s, container support is not enabled",
|
|
g_strerror(errno));
|
|
return -1;
|
|
} else if (virProcessWait(cpid, NULL, false) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("All namespaces (%x) are enabled", ns);
|
|
return 0;
|
|
}
|
|
|
|
#else /* !defined(__linux__) */
|
|
|
|
int
|
|
virProcessSetupPrivateMountNS(void)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Namespaces are not supported on this platform."));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virProcessNamespaceAvailable(unsigned int ns G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Namespaces are not supported on this platform."));
|
|
return -1;
|
|
}
|
|
|
|
#endif /* !defined(__linux__) */
|
|
|
|
/**
|
|
* virProcessExitWithStatus:
|
|
* @status: raw status to be reproduced when this process dies
|
|
*
|
|
* Given a raw status obtained by waitpid() or similar, attempt to
|
|
* make this process exit in the same manner. If the child died by
|
|
* signal, reset that signal handler to default and raise the same
|
|
* signal; if that doesn't kill this process, then exit with 128 +
|
|
* signal number. If @status can't be deciphered, use
|
|
* EXIT_CANNOT_INVOKE.
|
|
*
|
|
* Never returns.
|
|
*/
|
|
void
|
|
virProcessExitWithStatus(int status)
|
|
{
|
|
int value = EXIT_CANNOT_INVOKE;
|
|
|
|
#ifndef WIN32
|
|
if (WIFEXITED(status)) {
|
|
value = WEXITSTATUS(status);
|
|
} else if (WIFSIGNALED(status)) {
|
|
struct sigaction act;
|
|
sigset_t sigs;
|
|
|
|
if (sigemptyset(&sigs) == 0 &&
|
|
sigaddset(&sigs, WTERMSIG(status)) == 0)
|
|
sigprocmask(SIG_UNBLOCK, &sigs, NULL);
|
|
memset(&act, 0, sizeof(act));
|
|
act.sa_handler = SIG_DFL;
|
|
sigfillset(&act.sa_mask);
|
|
sigaction(WTERMSIG(status), &act, NULL);
|
|
raise(WTERMSIG(status));
|
|
value = 128 + WTERMSIG(status);
|
|
}
|
|
#else /* WIN32 */
|
|
(void)status;
|
|
#endif /* WIN32 */
|
|
exit(value);
|
|
}
|
|
|
|
#if WITH_SCHED_SETSCHEDULER
|
|
|
|
static int
|
|
virProcessSchedTranslatePolicy(virProcessSchedPolicy policy)
|
|
{
|
|
switch (policy) {
|
|
case VIR_PROC_POLICY_NONE:
|
|
return SCHED_OTHER;
|
|
|
|
case VIR_PROC_POLICY_BATCH:
|
|
# ifdef SCHED_BATCH
|
|
return SCHED_BATCH;
|
|
# else
|
|
return -1;
|
|
# endif
|
|
|
|
case VIR_PROC_POLICY_IDLE:
|
|
# ifdef SCHED_IDLE
|
|
return SCHED_IDLE;
|
|
# else
|
|
return -1;
|
|
# endif
|
|
|
|
case VIR_PROC_POLICY_FIFO:
|
|
return SCHED_FIFO;
|
|
|
|
case VIR_PROC_POLICY_RR:
|
|
return SCHED_RR;
|
|
|
|
case VIR_PROC_POLICY_LAST:
|
|
/* nada */
|
|
break;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virProcessSetScheduler(pid_t pid,
|
|
virProcessSchedPolicy policy,
|
|
int priority)
|
|
{
|
|
struct sched_param param = {0};
|
|
int pol = virProcessSchedTranslatePolicy(policy);
|
|
|
|
VIR_DEBUG("pid=%lld, policy=%d, priority=%u",
|
|
(long long) pid, policy, priority);
|
|
|
|
if (!policy)
|
|
return 0;
|
|
|
|
if (pol < 0) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("Scheduler '%s' is not supported on this platform"),
|
|
virProcessSchedPolicyTypeToString(policy));
|
|
return -1;
|
|
}
|
|
|
|
if (pol == SCHED_FIFO || pol == SCHED_RR) {
|
|
int min = 0;
|
|
int max = 0;
|
|
|
|
if ((min = sched_get_priority_min(pol)) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Cannot get minimum scheduler "
|
|
"priority value"));
|
|
return -1;
|
|
}
|
|
|
|
if ((max = sched_get_priority_max(pol)) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Cannot get maximum scheduler "
|
|
"priority value"));
|
|
return -1;
|
|
}
|
|
|
|
if (priority < min || priority > max) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("Scheduler priority %d out of range [%d, %d]"),
|
|
priority, min, max);
|
|
return -1;
|
|
}
|
|
|
|
param.sched_priority = priority;
|
|
}
|
|
|
|
if (sched_setscheduler(pid, pol, ¶m) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot set scheduler parameters for pid %lld"),
|
|
(long long) pid);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#else /* ! WITH_SCHED_SETSCHEDULER */
|
|
|
|
int
|
|
virProcessSetScheduler(pid_t pid G_GNUC_UNUSED,
|
|
virProcessSchedPolicy policy,
|
|
int priority G_GNUC_UNUSED)
|
|
{
|
|
if (!policy)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Process CPU scheduling is not supported "
|
|
"on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
#endif /* !WITH_SCHED_SETSCHEDULER */
|