[CRIU] [PATCH 1/2] files: restore cwd after switching mntns
Pavel Emelyanov
xemul at parallels.com
Thu Nov 19 05:50:54 PST 2015
On 11/19/2015 03:37 PM, Andrew Vagin wrote:
> On Thu, Nov 19, 2015 at 03:23:30PM +0300, Pavel Emelyanov wrote:
>> On 11/18/2015 02:04 PM, Andrey Vagin wrote:
>>> From: Andrew Vagin <avagin at virtuozzo.com>
>>
>> Comment required.
>
> Here is a problem that restore_ns() restores a mount namespace, but
> doesn't restore cwd, so cwd will be an root of the restired mntns.
>
> CRIU doesn't expect this, so we will see errors. Fro example, Stas
> reports an error that criu can't umount an roots yard.
Nice. Does the same problem exists for the root dir? Do we want to
fix it too?
>>
>>> Cc: Stanislav Kinsbursky <skinsbursky at openvz.org>
>>> Reported-by: Stanislav Kinsbursky <skinsbursky at openvz.org>
>>> Signed-off-by: Andrew Vagin <avagin at virtuozzo.com>
>>> ---
>>> files-reg.c | 16 ++++++++++++++++
>>> 1 file changed, 16 insertions(+)
>>>
>>> diff --git a/files-reg.c b/files-reg.c
>>> index 1e2daa9..ac334e7 100644
>>> --- a/files-reg.c
>>> +++ b/files-reg.c
>>> @@ -423,6 +423,7 @@ void try_clean_remaps(int ns_fd)
>>> {
>>> struct remap_info *ri;
>>> int old_ns = -1;
>>> + int cwd_fd = -1;
>>>
>>> if (list_empty(&remaps))
>>> goto out;
>>> @@ -436,6 +437,12 @@ void try_clean_remaps(int ns_fd)
>>> return;
>>> }
>>>
>>> + cwd_fd = open(".", O_DIRECTORY);
>>> + if (cwd_fd < 0) {
>>> + pr_perror("Unable to open cwd");
>>> + return;
>>> + }
>>> +
>>> if (setns(ns_fd, CLONE_NEWNS) < 0) {
>>> close(old_ns);
>>> pr_perror("`- Can't switch");
>>> @@ -453,6 +460,15 @@ void try_clean_remaps(int ns_fd)
>>> close(old_ns);
>>> }
>>>
>>> + if (cwd_fd >= 0) {
>>> + if (fchdir(cwd_fd)) {
>>> + pr_perror("Unable to restore cwd");
>>> + close(cwd_fd);
>>> + return;
>>> + }
>>> + close(cwd_fd);
>>> + }
>>> +
>>> out:
>>> if (ns_fd >= 0)
>>> close(ns_fd);
>>>
>>
> .
>
More information about the CRIU
mailing list