summaryrefslogtreecommitdiff
path: root/src/lxc/lxc_controller.c
diff options
context:
space:
mode:
authorMichal Privoznik <mprivozn@redhat.com>2021-04-20 10:33:03 +0200
committerMichal Privoznik <mprivozn@redhat.com>2021-04-22 14:10:47 +0200
commit1051c23b51f4bb0dcd89cc458e170a54329d8bea (patch)
tree1f14274acc5820fd78d099b10de93454b29907e5 /src/lxc/lxc_controller.c
parent5aba8d5438d5b299e6fb1891574c9f3e894db42d (diff)
downloadlibvirt-1051c23b51f4bb0dcd89cc458e170a54329d8bea.tar.gz
lxc: Let the driver detect CGroups earlier
This is the bug I'm facing. I deliberately configured a container so that the source of a <filesystem/> to passthrough doesn't exist. The start fails with: lxcContainerPivotRoot:669 : Failed to create /non-existent/path/.oldroot: Permission denied which is expected. But what is NOT expected is that CGroup hierarchy is left behind. This is because the controller sets up the CGroup hierarchy, user namespace, moves interfaces, etc. and finally checks whether container setup (done in a separate process) succeeded. Only after all this the error is propagated to the LXC driver. The driver aborts the startup and tries to perform the cleanup, but this is missing CGroups because those weren't detected yet. Ideally, whenever a function fails, it tries to unroll back so that is has no artifacts left behind (look at all those frees/FD closes/etc. at end of functions). But with CGroups it is different - the controller process can't clean up after itself, because it is still running inside that CGroup. Therefore, what we have to do is to let the driver detect CGroups as soon as they are created, and proceed with controller execution only after that. Signed-off-by: Michal Privoznik <mprivozn@redhat.com> Reviewed-by: Martin Kletzander <mkletzan@redhat.com>
Diffstat (limited to 'src/lxc/lxc_controller.c')
-rw-r--r--src/lxc/lxc_controller.c19
1 files changed, 17 insertions, 2 deletions
diff --git a/src/lxc/lxc_controller.c b/src/lxc/lxc_controller.c
index 8f0ece98cd..066e013ed4 100644
--- a/src/lxc/lxc_controller.c
+++ b/src/lxc/lxc_controller.c
@@ -348,7 +348,7 @@ static int virLXCControllerConsoleSetNonblocking(virLXCControllerConsole *consol
}
-static int virLXCControllerDaemonHandshake(virLXCController *ctrl)
+static int virLXCControllerDaemonHandshakeCont(virLXCController *ctrl)
{
if (lxcContainerSendContinue(ctrl->handshakeFds[1]) < 0) {
virReportSystemError(errno, "%s",
@@ -358,6 +358,15 @@ static int virLXCControllerDaemonHandshake(virLXCController *ctrl)
return 0;
}
+static int virLXCControllerDaemonHandshakeWait(virLXCController *ctrl)
+{
+ if (lxcContainerWaitForContinue(ctrl->handshakeFds[0]) < 0) {
+ virReportSystemError(errno, "%s",
+ _("error waiting for continue signal from daemon"));
+ return -1;
+ }
+ return 0;
+}
static int virLXCControllerValidateNICs(virLXCController *ctrl)
{
@@ -2372,6 +2381,11 @@ virLXCControllerRun(virLXCController *ctrl)
if (virLXCControllerSetupCgroupLimits(ctrl) < 0)
goto cleanup;
+ /* Allow daemon to detect CGroups. */
+ if (virLXCControllerDaemonHandshakeCont(ctrl) < 0 ||
+ virLXCControllerDaemonHandshakeWait(ctrl) < 0)
+ goto cleanup;
+
if (virLXCControllerSetupUserns(ctrl) < 0)
goto cleanup;
@@ -2401,7 +2415,8 @@ virLXCControllerRun(virLXCController *ctrl)
if (virLXCControllerConsoleSetNonblocking(&(ctrl->consoles[i])) < 0)
goto cleanup;
- if (virLXCControllerDaemonHandshake(ctrl) < 0)
+ /* Allow daemon to connect to the monitor. */
+ if (virLXCControllerDaemonHandshakeCont(ctrl) < 0)
goto cleanup;
/* and preemptively close handshakeFds */