Commit 71a4b46c authored by Pavel Emelyanov's avatar Pavel Emelyanov Committed by Andrei Vagin

infect: Introduce infect_ctx

This structure will become the part of compel A[PB]I and
will be used by compel clients as configuration structure.

For now put there the pointer on a socket living in victim's
netns. If empty (-1), compel will create this socket its own,
but CRIU already creates such in an effective manner.
Signed-off-by: 's avatarPavel Emelyanov <xemul@virtuozzo.com>
Signed-off-by: 's avatarAndrei Vagin <avagin@virtuozzo.com>
parent 903be413
......@@ -26,6 +26,10 @@ struct thread_ctx {
user_regs_struct_t regs;
};
struct infect_ctx {
int *p_sock;
};
/* parasite control block */
struct parasite_ctl {
int rpid; /* Real pid of the victim */
......@@ -34,6 +38,8 @@ struct parasite_ctl {
void *sigreturn_addr; /* A place for the breakpoint */
unsigned long map_length;
struct infect_ctx ictx;
/* thread leader data */
bool daemonized;
......
......@@ -446,7 +446,7 @@ static int restore_child_handler()
}
static int prepare_tsock(struct parasite_ctl *ctl, pid_t pid,
struct parasite_init_args *args, struct ns_id *net)
struct parasite_init_args *args)
{
static int ssock = -1;
......@@ -454,8 +454,13 @@ static int prepare_tsock(struct parasite_ctl *ctl, pid_t pid,
args->h_addr_len = gen_parasite_saddr(&args->h_addr, getpid());
if (ssock == -1) {
ssock = net->net.seqsk;
net->net.seqsk = -1;
ssock = *ctl->ictx.p_sock;
if (ssock == -1) {
pr_err("No socket in ictx\n");
goto err;
}
*ctl->ictx.p_sock = -1;
if (bind(ssock, (struct sockaddr *)&args->h_addr, args->h_addr_len) < 0) {
pr_perror("Can't bind socket");
......@@ -499,7 +504,7 @@ static int accept_tsock(struct parasite_ctl *ctl)
return 0;
}
static int parasite_init_daemon(struct parasite_ctl *ctl, struct ns_id *net)
static int parasite_init_daemon(struct parasite_ctl *ctl)
{
struct parasite_init_args *args;
pid_t pid = ctl->rpid;
......@@ -515,7 +520,7 @@ static int parasite_init_daemon(struct parasite_ctl *ctl, struct ns_id *net)
futex_set(&args->daemon_connected, 0);
if (prepare_tsock(ctl, pid, args, net))
if (prepare_tsock(ctl, pid, args))
goto err;
/* after this we can catch parasite errors in chld handler */
......@@ -1435,7 +1440,7 @@ static int parasite_start_daemon(struct parasite_ctl *ctl, struct pstree_item *i
if (construct_sigframe(ctl->sigframe, ctl->rsigframe, &ctl->orig.sigmask, item->core[0]))
return -1;
if (parasite_init_daemon(ctl, dmpi(item)->netns))
if (parasite_init_daemon(ctl))
return -1;
return 0;
......@@ -1475,6 +1480,8 @@ struct parasite_ctl *parasite_infect_seized(pid_t pid, struct pstree_item *item,
if (!ctl)
return NULL;
ctl->ictx.p_sock = &dmpi(item)->netns->net.seqsk;
parasite_ensure_args_size(dump_pages_args_size(vma_area_list));
parasite_ensure_args_size(aio_rings_args_size(vma_area_list));
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment