[lxc-devel] [PATCH] check for access to lxcpath

Serge Hallyn serge.hallyn at ubuntu.com
Wed Feb 12 04:20:03 UTC 2014


The previous check for access to rootfs->path failed in the case of
overlayfs or loop backign stores.  Instead just check early on for
access to lxcpath.

Signed-off-by: Serge Hallyn <serge.hallyn at ubuntu.com>
---
 src/lxc/conf.c  | 30 ------------------------------
 src/lxc/start.c | 30 ++++++++++++++++++++++++++++++
 2 files changed, 30 insertions(+), 30 deletions(-)

diff --git a/src/lxc/conf.c b/src/lxc/conf.c
index 522c590..ecf2171 100644
--- a/src/lxc/conf.c
+++ b/src/lxc/conf.c
@@ -753,31 +753,6 @@ static int lxc_mount_auto_mounts(struct lxc_conf *conf, int flags, struct lxc_ha
 	return 0;
 }
 
-static void print_top_failing_dir(const char *path)
-{
-	size_t len = strlen(path);
-	char *copy = alloca(len+1), *p, *e, saved;
-	strcpy(copy, path);
-
-	p = copy;
-	e = copy + len;
-	while (p < e) {
-		while (p < e && *p == '/') p++;
-		while (p < e && *p != '/') p++;
-		if (p >= e)
-			return;
-		saved = *p;
-		*p = '\0';
-		if (access(copy, X_OK)) {
-			SYSERROR("could not access %s.  Please grant it 'x' " \
-			      "access, or add an ACL for the container root.",
-			      copy);
-			return;
-		}
-		*p = saved;
-	}
-}
-
 static int mount_rootfs(const char *rootfs, const char *target, const char *options)
 {
 	char absrootfs[MAXPATHLEN];
@@ -1571,11 +1546,6 @@ static int setup_rootfs(struct lxc_conf *conf)
 		return -1;
 	}
 
-	if (access(rootfs->path, R_OK)) {
-		print_top_failing_dir(rootfs->path);
-		return -1;
-	}
-
 	if (detect_shared_rootfs()) {
 		if (chroot_into_slave(conf)) {
 			ERROR("Failed to chroot into slave /");
diff --git a/src/lxc/start.c b/src/lxc/start.c
index ff2753a..69e3486 100644
--- a/src/lxc/start.c
+++ b/src/lxc/start.c
@@ -83,6 +83,31 @@ const struct ns_info ns_info[LXC_NS_MAX] = {
 	[LXC_NS_NET] = {"net", CLONE_NEWNET}
 };
 
+static void print_top_failing_dir(const char *path)
+{
+	size_t len = strlen(path);
+	char *copy = alloca(len+1), *p, *e, saved;
+	strcpy(copy, path);
+
+	p = copy;
+	e = copy + len;
+	while (p < e) {
+		while (p < e && *p == '/') p++;
+		while (p < e && *p != '/') p++;
+		if (p >= e)
+			return;
+		saved = *p;
+		*p = '\0';
+		if (access(copy, X_OK)) {
+			SYSERROR("could not access %s.  Please grant it 'x' " \
+			      "access, or add an ACL for the container root.",
+			      copy);
+			return;
+		}
+		*p = saved;
+	}
+}
+
 static void close_ns(int ns_fd[LXC_NS_MAX]) {
 	int i;
 
@@ -592,6 +617,11 @@ static int do_start(void *data)
 		}
 	}
 
+	if (access(handler->lxcpath, R_OK)) {
+		print_top_failing_dir(handler->lxcpath);
+		goto out_warn_father;
+	}
+
 	#if HAVE_SYS_CAPABILITY_H
 	if (handler->conf->need_utmp_watch) {
 		if (prctl(PR_CAPBSET_DROP, CAP_SYS_BOOT, 0, 0, 0)) {
-- 
1.9.rc1



More information about the lxc-devel mailing list