diff options
author | Kevin Krakauer <krakauer@google.com> | 2018-06-22 14:30:33 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-06-22 14:31:25 -0700 |
commit | 04bdcc7b65ac03eeca9b14608a12067e1205081b (patch) | |
tree | e88ce30df1c5b433f44a51e8cbb211f56f6306dc /runsc/boot/loader.go | |
parent | e0e640981282ece051c33700f4e272047fa4e5b6 (diff) |
runsc: Enable waiting on individual containers within a sandbox.
PiperOrigin-RevId: 201742160
Change-Id: Ia9fa1442287c5f9e1196fb117c41536a80f6bb31
Diffstat (limited to 'runsc/boot/loader.go')
-rw-r--r-- | runsc/boot/loader.go | 67 |
1 files changed, 62 insertions, 5 deletions
diff --git a/runsc/boot/loader.go b/runsc/boot/loader.go index a0a28dc43..7097f220b 100644 --- a/runsc/boot/loader.go +++ b/runsc/boot/loader.go @@ -16,10 +16,12 @@ package boot import ( + "errors" "fmt" "math/rand" "os" "runtime" + "sync" "sync/atomic" "syscall" gtime "time" @@ -81,6 +83,16 @@ type Loader struct { // rootProcArgs refers to the root sandbox init task. rootProcArgs kernel.CreateProcessArgs + + // mu guards containerRootTGIDs. + mu sync.Mutex + + // containerRootTGIDs maps container IDs to their root processes. It + // can be used to determine which process to manipulate when clients + // call methods on particular containers. + // + // containerRootTGIDs is guarded by mu. + containerRootTGIDs map[string]kernel.ThreadID } func init() { @@ -377,12 +389,14 @@ func (l *Loader) run() error { return l.k.Start() } -func (l *Loader) startContainer(args *StartArgs, k *kernel.Kernel) error { +// startContainer starts a child container. It returns the thread group ID of +// the newly created process. +func (l *Loader) startContainer(args *StartArgs, k *kernel.Kernel) (kernel.ThreadID, error) { spec := args.Spec // Create capabilities. caps, err := specutils.Capabilities(spec.Process.Capabilities) if err != nil { - return fmt.Errorf("error creating capabilities: %v", err) + return 0, fmt.Errorf("error creating capabilities: %v", err) } // Convert the spec's additional GIDs to KGIDs. @@ -416,19 +430,62 @@ func (l *Loader) startContainer(args *StartArgs, k *kernel.Kernel) error { k.RootIPCNamespace(), k) if err != nil { - return fmt.Errorf("failed to create new process: %v", err) + return 0, fmt.Errorf("failed to create new process: %v", err) + } + + tg, err := l.k.CreateProcess(procArgs) + if err != nil { + return 0, fmt.Errorf("failed to create process in sentry: %v", err) } - if _, err := l.k.CreateProcess(procArgs); err != nil { - return fmt.Errorf("failed to create process in sentry: %v", err) + ts := k.TaskSet() + tgid := ts.Root.IDOfThreadGroup(tg) + if tgid == 0 { + return 0, errors.New("failed to get thread group ID of new process") } // CreateProcess takes a reference on FDMap if successful. procArgs.FDMap.DecRef() + l.mu.Lock() + defer l.mu.Unlock() + l.containerRootTGIDs[args.CID] = tgid + + return tgid, nil +} + +// wait waits for the init process in the given container. +func (l *Loader) wait(cid *string, waitStatus *uint32) error { + l.mu.Lock() + defer l.mu.Unlock() + tgid, ok := l.containerRootTGIDs[*cid] + if !ok { + return fmt.Errorf("can't find process for container %q in %v", *cid, l.containerRootTGIDs) + } + + // TODO: Containers don't map 1:1 with their root + // processes. Container exits should be managed explicitly + // rather than via PID. + // If the thread either has already exited or exits during waiting, + // consider the container exited. + defer delete(l.containerRootTGIDs, *cid) + + tg := l.k.TaskSet().Root.ThreadGroupWithID(tgid) + if tg == nil { + return fmt.Errorf("no thread group with ID %d", tgid) + } + tg.WaitExited() + *waitStatus = tg.ExitStatus().Status() return nil } +func (l *Loader) setRootContainerID(cid string) { + l.mu.Lock() + defer l.mu.Unlock() + // The root container has PID 1. + l.containerRootTGIDs = map[string]kernel.ThreadID{cid: 1} +} + // WaitForStartSignal waits for a start signal from the control server. func (l *Loader) WaitForStartSignal() { <-l.ctrl.manager.startChan |