Skip to content
This repository has been archived by the owner on May 12, 2021. It is now read-only.

Commit

Permalink
Merge pull request #136 from sboeuf/fix_rollback
Browse files Browse the repository at this point in the history
virtcontainers: Properly rollback mounts and hotplugs when container creation failed
  • Loading branch information
Sebastien Boeuf authored Apr 3, 2018
2 parents 75235a8 + e98f930 commit e75713f
Show file tree
Hide file tree
Showing 2 changed files with 75 additions and 31 deletions.
72 changes: 48 additions & 24 deletions virtcontainers/container.go
Original file line number Diff line number Diff line change
Expand Up @@ -416,63 +416,78 @@ func newContainer(pod *Pod, contConfig ContainerConfig) (*Container, error) {
return c, nil
}

// rollbackFailingContainerCreation rolls back important steps that might have
// been performed before the container creation failed.
// - Unplug CPU and memory resources from the VM.
// - Unplug devices from the VM.
func rollbackFailingContainerCreation(c *Container, err error) {
if err != nil && c != nil {
if err2 := c.removeResources(); err2 != nil {
c.Logger().WithError(err2).Error("rollback failed removeResources()")
}
if err2 := c.detachDevices(); err2 != nil {
c.Logger().WithError(err2).Error("rollback failed detachDevices()")
}
if err2 := c.removeDrive(); err2 != nil {
c.Logger().WithError(err2).Error("rollback failed removeDrive()")
}
}
}

// createContainer creates and start a container inside a Pod. It has to be
// called only when a new container, not known by the pod, has to be created.
func createContainer(pod *Pod, contConfig ContainerConfig) (*Container, error) {
func createContainer(pod *Pod, contConfig ContainerConfig) (c *Container, err error) {
if pod == nil {
return nil, errNeedPod
}

c, err := newContainer(pod, contConfig)
c, err = newContainer(pod, contConfig)
if err != nil {
return nil, err
return
}

if err := c.createContainersDirs(); err != nil {
return nil, err
if err = c.createContainersDirs(); err != nil {
return
}

if !c.pod.config.HypervisorConfig.DisableBlockDeviceUse {
agentCaps := c.pod.agent.capabilities()
hypervisorCaps := c.pod.hypervisor.capabilities()
// In case the container creation fails, the following takes care
// of rolling back all the actions previously performed.
defer rollbackFailingContainerCreation(c, err)

if agentCaps.isBlockDeviceSupported() && hypervisorCaps.isBlockDeviceHotplugSupported() {
if err := c.hotplugDrive(); err != nil {
return nil, err
}
}
if err = c.hotplugDrive(); err != nil {
return
}

// Attach devices
if err := c.attachDevices(); err != nil {
return nil, err
if err = c.attachDevices(); err != nil {
return
}

if err := c.addResources(); err != nil {
return nil, err
if err = c.addResources(); err != nil {
return
}

// Deduce additional system mount info that should be handled by the agent
// inside the VM
c.getSystemMountInfo()

if err := c.storeDevices(); err != nil {
return nil, err
if err = c.storeDevices(); err != nil {
return
}

process, err := pod.agent.createContainer(c.pod, c)
if err != nil {
return nil, err
return c, err
}
c.process = *process

// Store the container process returned by the agent.
if err := c.storeProcess(); err != nil {
return nil, err
if err = c.storeProcess(); err != nil {
return
}

if err := c.setContainerState(StateReady); err != nil {
return nil, err
if err = c.setContainerState(StateReady); err != nil {
return
}

return c, nil
Expand Down Expand Up @@ -666,6 +681,15 @@ func (c *Container) processList(options ProcessListOptions) (ProcessList, error)
}

func (c *Container) hotplugDrive() error {
agentCaps := c.pod.agent.capabilities()
hypervisorCaps := c.pod.hypervisor.capabilities()

if c.pod.config.HypervisorConfig.DisableBlockDeviceUse ||
!agentCaps.isBlockDeviceSupported() ||
!hypervisorCaps.isBlockDeviceHotplugSupported() {
return nil
}

dev, err := getDeviceForPath(c.rootFs)

if err == errMountPointNotFound {
Expand Down
34 changes: 27 additions & 7 deletions virtcontainers/kata_agent.go
Original file line number Diff line number Diff line change
Expand Up @@ -599,7 +599,25 @@ func (k *kataAgent) appendDevices(deviceList []*grpc.Device, devices []Device) [
return deviceList
}

func (k *kataAgent) createContainer(pod *Pod, c *Container) (*Process, error) {
// rollbackFailingContainerCreation rolls back important steps that might have
// been performed before the container creation failed.
// - Unmount container volumes.
// - Unmount container rootfs.
func (k *kataAgent) rollbackFailingContainerCreation(c *Container, err error) {
if err != nil {
if c != nil {
if err2 := c.unmountHostMounts(); err2 != nil {
k.Logger().WithError(err2).Error("rollback failed unmountHostMounts()")
}

if err2 := bindUnmountContainerRootfs(kataHostSharedDir, c.pod.id, c.id); err2 != nil {
k.Logger().WithError(err2).Error("rollback failed bindUnmountContainerRootfs()")
}
}
}
}

func (k *kataAgent) createContainer(pod *Pod, c *Container) (p *Process, err error) {
ociSpecJSON, ok := c.config.Annotations[vcAnnotations.ConfigJSONKey]
if !ok {
return nil, errorMissingOCISpec
Expand All @@ -619,6 +637,10 @@ func (k *kataAgent) createContainer(pod *Pod, c *Container) (*Process, error) {
rootPathParent := filepath.Join(kataGuestSharedDir, c.id)
rootPath := filepath.Join(rootPathParent, rootfsDir)

// In case the container creation fails, the following defer statement
// takes care of rolling back actions previously performed.
defer k.rollbackFailingContainerCreation(c, err)

if c.state.Fstype != "" {
// This is a block based device rootfs.

Expand Down Expand Up @@ -667,27 +689,25 @@ func (k *kataAgent) createContainer(pod *Pod, c *Container) (*Process, error) {
// (kataGuestSharedDir) is already mounted in the
// guest. We only need to mount the rootfs from
// the host and it will show up in the guest.
if err := bindMountContainerRootfs(kataHostSharedDir, pod.id, c.id, c.rootFs, false); err != nil {
bindUnmountAllRootfs(kataHostSharedDir, *pod)
if err = bindMountContainerRootfs(kataHostSharedDir, pod.id, c.id, c.rootFs, false); err != nil {
return nil, err
}
}

ociSpec := &specs.Spec{}
if err := json.Unmarshal([]byte(ociSpecJSON), ociSpec); err != nil {
if err = json.Unmarshal([]byte(ociSpecJSON), ociSpec); err != nil {
return nil, err
}

// Handle container mounts
newMounts, err := c.mountSharedDirMounts(kataHostSharedDir, kataGuestSharedDir)
if err != nil {
bindUnmountAllRootfs(kataHostSharedDir, *pod)
return nil, err
}

// We replace all OCI mount sources that match our container mount
// with the right source path (The guest one).
if err := k.replaceOCIMountSource(ociSpec, newMounts); err != nil {
if err = k.replaceOCIMountSource(ociSpec, newMounts); err != nil {
return nil, err
}

Expand All @@ -714,7 +734,7 @@ func (k *kataAgent) createContainer(pod *Pod, c *Container) (*Process, error) {
OCI: grpcSpec,
}

if _, err := k.sendReq(req); err != nil {
if _, err = k.sendReq(req); err != nil {
return nil, err
}

Expand Down

0 comments on commit e75713f

Please sign in to comment.