YARN-10019. Improved container-executor exec() calls.
Contributed by Peter Bacsko
This commit is contained in:
parent
e589f6199c
commit
2301b25899
|
@ -1610,7 +1610,7 @@ int exec_container(const char *command_file) {
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if (rc < 0) {
|
if (rc < 0) {
|
||||||
if (errno==5) {
|
if (errno == EIO) {
|
||||||
fprintf(stderr, "Remote Connection Closed.\n");
|
fprintf(stderr, "Remote Connection Closed.\n");
|
||||||
exit(0);
|
exit(0);
|
||||||
} else {
|
} else {
|
||||||
|
@ -1644,21 +1644,21 @@ int exec_container(const char *command_file) {
|
||||||
tcsetattr (fds, TCSANOW, &new_term_settings);
|
tcsetattr (fds, TCSANOW, &new_term_settings);
|
||||||
|
|
||||||
// The slave side of the PTY becomes the standard input and outputs of the child process
|
// The slave side of the PTY becomes the standard input and outputs of the child process
|
||||||
close(0); // Close standard input (current terminal)
|
close(STDIN_FILENO); // Close standard input (current terminal)
|
||||||
close(1); // Close standard output (current terminal)
|
close(STDOUT_FILENO); // Close standard output (current terminal)
|
||||||
close(2); // Close standard error (current terminal)
|
close(STDERR_FILENO); // Close standard error (current terminal)
|
||||||
|
|
||||||
if (dup(fds) == -1) {
|
if (dup(fds) == -1) {
|
||||||
// PTY becomes standard input (0)
|
// PTY becomes standard input (0)
|
||||||
exit(DOCKER_EXEC_FAILED);
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
}
|
}
|
||||||
if (dup(fds) == -1) {
|
if (dup(fds) == -1) {
|
||||||
// PTY becomes standard output (1)
|
// PTY becomes standard output (1)
|
||||||
exit(DOCKER_EXEC_FAILED);
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
}
|
}
|
||||||
if (dup(fds) == -1) {
|
if (dup(fds) == -1) {
|
||||||
// PTY becomes standard error (2)
|
// PTY becomes standard error (2)
|
||||||
exit(DOCKER_EXEC_FAILED);
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Now the original file descriptor is useless
|
// Now the original file descriptor is useless
|
||||||
|
@ -1669,8 +1669,8 @@ int exec_container(const char *command_file) {
|
||||||
setsid();
|
setsid();
|
||||||
} else {
|
} else {
|
||||||
exit_code = set_user(user);
|
exit_code = set_user(user);
|
||||||
if (exit_code!=0) {
|
if (exit_code != 0) {
|
||||||
goto cleanup;
|
_exit(exit_code);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1679,24 +1679,20 @@ int exec_container(const char *command_file) {
|
||||||
ioctl(0, TIOCSCTTY, 1);
|
ioctl(0, TIOCSCTTY, 1);
|
||||||
if (docker) {
|
if (docker) {
|
||||||
ret = execvp(binary, args);
|
ret = execvp(binary, args);
|
||||||
|
fprintf(ERRORFILE, "exec failed - %s\n", strerror(errno));
|
||||||
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
} else {
|
} else {
|
||||||
if (change_user(user_detail->pw_uid, user_detail->pw_gid) != 0) {
|
if (change_user(user_detail->pw_uid, user_detail->pw_gid) != 0) {
|
||||||
exit_code = DOCKER_EXEC_FAILED;
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
goto cleanup;
|
|
||||||
}
|
}
|
||||||
ret = chdir(workdir);
|
ret = chdir(workdir);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
exit_code = DOCKER_EXEC_FAILED;
|
fprintf(ERRORFILE, "chdir failed - %s", strerror(errno));
|
||||||
goto cleanup;
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
}
|
}
|
||||||
ret = execve(binary, args, env);
|
execve(binary, args, env);
|
||||||
}
|
fprintf(ERRORFILE, "exec failed - %s\n", strerror(errno));
|
||||||
if (ret != 0) {
|
_exit(DOCKER_EXEC_FAILED);
|
||||||
fprintf(ERRORFILE, "Couldn't execute the container launch with args %s - %s\n",
|
|
||||||
binary, strerror(errno));
|
|
||||||
exit_code = DOCKER_EXEC_FAILED;
|
|
||||||
} else {
|
|
||||||
exit_code = 0;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1708,7 +1704,8 @@ cleanup:
|
||||||
free_values(args);
|
free_values(args);
|
||||||
free_values(env);
|
free_values(env);
|
||||||
free_configuration(&command_config);
|
free_configuration(&command_config);
|
||||||
return exit_code;
|
|
||||||
|
return exit_code; // we reach this point only if an error occurs
|
||||||
}
|
}
|
||||||
|
|
||||||
int exec_docker_command(char *docker_command, char **argv, int argc) {
|
int exec_docker_command(char *docker_command, char **argv, int argc) {
|
||||||
|
@ -2113,14 +2110,14 @@ int launch_docker_container_as_user(const char * user, const char *app_id,
|
||||||
if (so_fd == NULL) {
|
if (so_fd == NULL) {
|
||||||
fprintf(ERRORFILE, "Could not append to %s\n", so);
|
fprintf(ERRORFILE, "Could not append to %s\n", so);
|
||||||
exit_code = UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
exit_code = UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
||||||
goto cleanup;
|
_exit(exit_code);
|
||||||
}
|
}
|
||||||
FILE* se_fd = fopen(se, "a+");
|
FILE* se_fd = fopen(se, "a+");
|
||||||
if (se_fd == NULL) {
|
if (se_fd == NULL) {
|
||||||
fprintf(ERRORFILE, "Could not append to %s\n", se);
|
fprintf(ERRORFILE, "Could not append to %s\n", se);
|
||||||
exit_code = UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
exit_code = UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
||||||
fclose(so_fd);
|
fclose(so_fd);
|
||||||
goto cleanup;
|
_exit(exit_code);
|
||||||
}
|
}
|
||||||
// if entry point is enabled, clone docker command output
|
// if entry point is enabled, clone docker command output
|
||||||
// to stdout.txt and stderr.txt for yarn.
|
// to stdout.txt and stderr.txt for yarn.
|
||||||
|
@ -2130,19 +2127,19 @@ int launch_docker_container_as_user(const char * user, const char *app_id,
|
||||||
if (dup2(fileno(so_fd), fileno(stdout)) == -1) {
|
if (dup2(fileno(so_fd), fileno(stdout)) == -1) {
|
||||||
fprintf(ERRORFILE, "Could not append to stdout.txt\n");
|
fprintf(ERRORFILE, "Could not append to stdout.txt\n");
|
||||||
fclose(so_fd);
|
fclose(so_fd);
|
||||||
return UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
_exit(UNABLE_TO_EXECUTE_CONTAINER_SCRIPT);
|
||||||
}
|
}
|
||||||
if (dup2(fileno(se_fd), fileno(stderr)) == -1) {
|
if (dup2(fileno(se_fd), fileno(stderr)) == -1) {
|
||||||
fprintf(ERRORFILE, "Could not append to stderr.txt\n");
|
fprintf(ERRORFILE, "Could not append to stderr.txt\n");
|
||||||
fclose(se_fd);
|
fclose(se_fd);
|
||||||
return UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
_exit(UNABLE_TO_EXECUTE_CONTAINER_SCRIPT);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
fclose(so_fd);
|
fclose(so_fd);
|
||||||
fclose(se_fd);
|
fclose(se_fd);
|
||||||
execvp(docker_binary, docker_command);
|
execvp(docker_binary, docker_command);
|
||||||
fprintf(ERRORFILE, "failed to execute docker command! error: %s\n", strerror(errno));
|
fprintf(ERRORFILE, "failed to execute docker command! error: %s\n", strerror(errno));
|
||||||
return UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
_exit(UNABLE_TO_EXECUTE_CONTAINER_SCRIPT);
|
||||||
} else {
|
} else {
|
||||||
if (use_entry_point) {
|
if (use_entry_point) {
|
||||||
int pid = 0;
|
int pid = 0;
|
||||||
|
@ -2332,16 +2329,14 @@ int launch_container_as_user(const char *user, const char *app_id,
|
||||||
// setsid
|
// setsid
|
||||||
pid_t pid = setsid();
|
pid_t pid = setsid();
|
||||||
if (pid == -1) {
|
if (pid == -1) {
|
||||||
exit_code = SETSID_OPER_FAILED;
|
_exit(SETSID_OPER_FAILED);
|
||||||
goto cleanup;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fprintf(LOGFILE, "Writing pid file...\n");
|
fprintf(LOGFILE, "Writing pid file...\n");
|
||||||
// write pid to pidfile
|
// write pid to pidfile
|
||||||
if (pid_file == NULL
|
if (pid_file == NULL
|
||||||
|| write_pid_to_file_as_nm(pid_file, pid) != 0) {
|
|| write_pid_to_file_as_nm(pid_file, pid) != 0) {
|
||||||
exit_code = WRITE_PIDFILE_FAILED;
|
_exit(WRITE_PIDFILE_FAILED);
|
||||||
goto cleanup;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef __linux
|
#ifdef __linux
|
||||||
|
@ -2354,8 +2349,7 @@ int launch_container_as_user(const char *user, const char *app_id,
|
||||||
*cgroup_ptr != NULL; ++cgroup_ptr) {
|
*cgroup_ptr != NULL; ++cgroup_ptr) {
|
||||||
if (strcmp(*cgroup_ptr, "none") != 0 &&
|
if (strcmp(*cgroup_ptr, "none") != 0 &&
|
||||||
write_pid_to_cgroup_as_root(*cgroup_ptr, pid) != 0) {
|
write_pid_to_cgroup_as_root(*cgroup_ptr, pid) != 0) {
|
||||||
exit_code = WRITE_CGROUP_FAILED;
|
_exit(WRITE_CGROUP_FAILED);
|
||||||
goto cleanup;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2368,7 +2362,7 @@ int launch_container_as_user(const char *user, const char *app_id,
|
||||||
container_file_source, cred_file_source, keystore_file_source, truststore_file_source);
|
container_file_source, cred_file_source, keystore_file_source, truststore_file_source);
|
||||||
if (exit_code != 0) {
|
if (exit_code != 0) {
|
||||||
fprintf(ERRORFILE, "Could not create local files and directories\n");
|
fprintf(ERRORFILE, "Could not create local files and directories\n");
|
||||||
goto cleanup;
|
_exit(exit_code);
|
||||||
}
|
}
|
||||||
|
|
||||||
fprintf(LOGFILE, "Launching container...\n");
|
fprintf(LOGFILE, "Launching container...\n");
|
||||||
|
@ -2385,13 +2379,10 @@ int launch_container_as_user(const char *user, const char *app_id,
|
||||||
#endif
|
#endif
|
||||||
umask(0027);
|
umask(0027);
|
||||||
|
|
||||||
if (execlp(script_file_dest, script_file_dest, NULL) != 0) {
|
execlp(script_file_dest, script_file_dest, NULL);
|
||||||
fprintf(LOGFILE, "Couldn't execute the container launch file %s - %s\n",
|
fprintf(LOGFILE, "Couldn't execute the container launch file %s - %s\n",
|
||||||
script_file_dest, strerror(errno));
|
script_file_dest, strerror(errno));
|
||||||
exit_code = UNABLE_TO_EXECUTE_CONTAINER_SCRIPT;
|
_exit(UNABLE_TO_EXECUTE_CONTAINER_SCRIPT);
|
||||||
goto cleanup;
|
|
||||||
}
|
|
||||||
exit_code = 0;
|
|
||||||
|
|
||||||
cleanup:
|
cleanup:
|
||||||
free(exit_code_file);
|
free(exit_code_file);
|
||||||
|
@ -2982,7 +2973,7 @@ static int run_traffic_control(const char *opts[], char *command_file) {
|
||||||
execv(TC_BIN, (char**)args);
|
execv(TC_BIN, (char**)args);
|
||||||
//if we reach here, exec failed
|
//if we reach here, exec failed
|
||||||
fprintf(LOGFILE, "failed to execute tc command! error: %s\n", strerror(errno));
|
fprintf(LOGFILE, "failed to execute tc command! error: %s\n", strerror(errno));
|
||||||
return TRAFFIC_CONTROL_EXECUTION_FAILED;
|
_exit(TRAFFIC_CONTROL_EXECUTION_FAILED);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -3233,7 +3224,7 @@ int remove_docker_container(char**argv, int argc) {
|
||||||
|
|
||||||
if (child_pid == 0) { // child
|
if (child_pid == 0) { // child
|
||||||
int rc = exec_docker_command("rm", args, 2);
|
int rc = exec_docker_command("rm", args, 2);
|
||||||
exit_code = rc; // Only get here if exec fails
|
_exit(rc);
|
||||||
} else { // parent
|
} else { // parent
|
||||||
exit_code = wait_and_get_exit_code(child_pid);
|
exit_code = wait_and_get_exit_code(child_pid);
|
||||||
if (exit_code != 0) {
|
if (exit_code != 0) {
|
||||||
|
|
|
@ -885,7 +885,7 @@ int run_runc_container(const char* command_file) {
|
||||||
pid_t child_pid = fork();
|
pid_t child_pid = fork();
|
||||||
if (child_pid == 0) {
|
if (child_pid == 0) {
|
||||||
exec_runc(rlc->container_id, runc_config_path, rlc->pid_file);
|
exec_runc(rlc->container_id, runc_config_path, rlc->pid_file);
|
||||||
exit(1); // just in case exec_runc returns somehow
|
_exit(1); // just in case exec_runc returns somehow
|
||||||
} else if (child_pid == -1) {
|
} else if (child_pid == -1) {
|
||||||
fprintf(ERRORFILE, "Error cannot fork: %s\n", strerror(errno));
|
fprintf(ERRORFILE, "Error cannot fork: %s\n", strerror(errno));
|
||||||
rc = OUT_OF_MEMORY;
|
rc = OUT_OF_MEMORY;
|
||||||
|
|
|
@ -103,7 +103,8 @@ enum errorcodes {
|
||||||
DOCKER_SERVICE_MODE_DISABLED = 75,
|
DOCKER_SERVICE_MODE_DISABLED = 75,
|
||||||
ERROR_RUNC_SETUP_FAILED = 76,
|
ERROR_RUNC_SETUP_FAILED = 76,
|
||||||
ERROR_RUNC_RUN_FAILED = 77,
|
ERROR_RUNC_RUN_FAILED = 77,
|
||||||
ERROR_RUNC_REAP_LAYER_MOUNTS_FAILED = 78
|
ERROR_RUNC_REAP_LAYER_MOUNTS_FAILED = 78,
|
||||||
|
ERROR_DOCKER_CONTAINER_EXEC_FAILED = 79
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Macros for min/max. */
|
/* Macros for min/max. */
|
||||||
|
|
|
@ -1169,7 +1169,8 @@ static int check_privileges(const char *user) {
|
||||||
int child_pid = fork();
|
int child_pid = fork();
|
||||||
if (child_pid == 0) {
|
if (child_pid == 0) {
|
||||||
execl("/usr/bin/sudo", "sudo", "-U", user, "-n", "-l", "docker", NULL);
|
execl("/usr/bin/sudo", "sudo", "-U", user, "-n", "-l", "docker", NULL);
|
||||||
exit(INITIALIZE_USER_FAILED);
|
fprintf(ERRORFILE, "could not invoke docker with sudo - %s\n", strerror(errno));
|
||||||
|
_exit(INITIALIZE_USER_FAILED);
|
||||||
} else {
|
} else {
|
||||||
while ((waitid = waitpid(child_pid, &statval, 0)) != child_pid) {
|
while ((waitid = waitpid(child_pid, &statval, 0)) != child_pid) {
|
||||||
if (waitid == -1 && errno != EINTR) {
|
if (waitid == -1 && errno != EINTR) {
|
||||||
|
|
Loading…
Reference in New Issue