summaryrefslogtreecommitdiffhomepage
path: root/runsc/boot/loader.go
diff options
context:
space:
mode:
authorKevin Krakauer <krakauer@google.com>2018-06-28 14:55:46 -0700
committerShentubot <shentubot@google.com>2018-06-28 14:56:36 -0700
commit16d37973ebc8f36ef613c0885879648cceaf1c45 (patch)
treec797f2c9352518b5372e961b74a6ae14f56fc307 /runsc/boot/loader.go
parent5a8e014c3d424abfe931b8493d06a129c3fdd388 (diff)
runsc: Add the "wait" subcommand.
Users can now call "runsc wait <container id>" to wait on a particular process inside the container. -pid can also be used to wait on a specific PID. Manually tested the wait subcommand for a single waiter and multiple waiters (simultaneously 2 processes waiting on the container and 2 processes waiting on a PID within the container). PiperOrigin-RevId: 202548978 Change-Id: Idd507c2cdea613c3a14879b51cfb0f7ea3fb3d4c
Diffstat (limited to 'runsc/boot/loader.go')
-rw-r--r--runsc/boot/loader.go49
1 files changed, 38 insertions, 11 deletions
diff --git a/runsc/boot/loader.go b/runsc/boot/loader.go
index f359a0eb0..014908179 100644
--- a/runsc/boot/loader.go
+++ b/runsc/boot/loader.go
@@ -83,6 +83,9 @@ type Loader struct {
// rootProcArgs refers to the root sandbox init task.
rootProcArgs kernel.CreateProcessArgs
+ // sandboxID is the ID for the whole sandbox.
+ sandboxID string
+
// mu guards containerRootTGIDs.
mu sync.Mutex
@@ -452,23 +455,46 @@ func (l *Loader) startContainer(args *StartArgs, k *kernel.Kernel) (kernel.Threa
return tgid, nil
}
-// wait waits for the init process in the given container.
-func (l *Loader) wait(cid *string, waitStatus *uint32) error {
+// TODO: Per-container namespaces must be supported
+// for -pid.
+
+// waitContainer waits for the root process of a container to exit.
+func (l *Loader) waitContainer(cid string, waitStatus *uint32) error {
+ // Don't defer unlock, as doing so would make it impossible for
+ // multiple clients to wait on the same container.
l.mu.Lock()
- defer l.mu.Unlock()
- tgid, ok := l.containerRootTGIDs[*cid]
+ tgid, ok := l.containerRootTGIDs[cid]
+ l.mu.Unlock()
if !ok {
- return fmt.Errorf("can't find process for container %q in %v", *cid, l.containerRootTGIDs)
+ return fmt.Errorf("can't find process for container %q in %v", cid, l.containerRootTGIDs)
}
-
- // TODO: Containers don't map 1:1 with their root
- // processes. Container exits should be managed explicitly
- // rather than via PID.
// If the thread either has already exited or exits during waiting,
// consider the container exited.
- defer delete(l.containerRootTGIDs, *cid)
+ defer func() {
+ l.mu.Lock()
+ defer l.mu.Unlock()
+ // TODO: Containers don't map 1:1 with their root
+ // processes. Container exits should be managed explicitly
+ // rather than via PID.
+ delete(l.containerRootTGIDs, cid)
+ }()
+ return l.wait(tgid, cid, waitStatus)
+}
+
+func (l *Loader) waitPID(tgid kernel.ThreadID, cid string, waitStatus *uint32) error {
+ // TODO: Containers all currently share a PID namespace.
+ // When per-container PID namespaces are supported, wait should use cid
+ // to find the appropriate PID namespace.
+ if cid != l.sandboxID {
+ return errors.New("non-sandbox PID namespaces are not yet implemented")
+ }
+ return l.wait(tgid, cid, waitStatus)
+}
- tg := l.k.TaskSet().Root.ThreadGroupWithID(tgid)
+// wait waits for the process with TGID 'tgid' in a container's PID namespace
+// to exit.
+func (l *Loader) wait(tgid kernel.ThreadID, cid string, waitStatus *uint32) error {
+ tg := l.k.TaskSet().Root.ThreadGroupWithID(kernel.ThreadID(tgid))
if tg == nil {
return fmt.Errorf("no thread group with ID %d", tgid)
}
@@ -482,6 +508,7 @@ func (l *Loader) setRootContainerID(cid string) {
defer l.mu.Unlock()
// The root container has PID 1.
l.containerRootTGIDs = map[string]kernel.ThreadID{cid: 1}
+ l.sandboxID = cid
}
// WaitForStartSignal waits for a start signal from the control server.