-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support more overlayfs layers #2502
support more overlayfs layers #2502
Conversation
6b8f114
to
47d8a50
Compare
Codecov Report
@@ Coverage Diff @@
## master #2502 +/- ##
==========================================
- Coverage 45.05% 44.95% -0.11%
==========================================
Files 94 95 +1
Lines 9796 9928 +132
==========================================
+ Hits 4414 4463 +49
- Misses 4662 4743 +81
- Partials 720 722 +2
Continue to review full report at Codecov.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we avoid circular dependency on docker/docker?
I see.... the |
cmd/containerd-shim/main_unix.go
Outdated
@@ -41,6 +41,7 @@ import ( | |||
shimapi "github.com/containerd/containerd/runtime/v1/shim/v1" | |||
"github.com/containerd/ttrpc" | |||
"github.com/containerd/typeurl" | |||
"github.com/docker/docker/pkg/reexec" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Using this as a dependency is a big no no. Either reimplement or find another solution.
DRY is a liability here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes @stevvooe. I will find other way to handle this. 😄
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Was looking around for a suggestion, but I think @dmcgowan covered the options in #2497 (comment).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Found a way to create a Fmountat
which we could use here dmcgowan@d8f6d09
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
mount/mount_linux.go
Outdated
newdirs = append(newdirs, dir[len(commondir):]) | ||
} | ||
|
||
m.Options = append(m.Options[:idx], m.Options[idx+1:]...) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Make a copy of m
before altering
mount/mount_linux.go
Outdated
|
||
// NOTE: the snapshot id is based on digits. in order to avoid to get | ||
// snapshots/x, need to back to parent snapshots dir. however, there is | ||
// assumption that the common dir is ${root}/io.containerd.v1.overlayfs. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should be ${root}/io.containerd.v1.overlayfs/snapshots
fd89efb
to
b41352b
Compare
_ "unsafe" // required for go:linkname. | ||
) | ||
|
||
//go:linkname beforeFork syscall.runtime_BeforeFork |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this officially supported across different versions of Go?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
# https://github.com/golang/go/blob/release-branch.go1.8/src/syscall/exec_linux.go#L46
func runtime_BeforeFork()
func runtime_AfterFork()
# https://github.com/golang/go/blob/release-branch.go1.9/src/syscall/exec_linux.go#L52
func runtime_BeforeFork()
func runtime_AfterFork()
func runtime_AfterForkInChild()
1.9 or higher supports the three features. But, I think go1.10 can work well than go1.9 since the runtime.LockOSThread
has been improved.
more input from https://golang.org/doc/go1.10#runtime
mount/mount_linux.go
Outdated
) | ||
|
||
// avoid hitting one page limit of mount argument buffer | ||
if m.Type == "overlay" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There should still be a page size check in here, we need to offload that to a linux only section though
mount/mount_linux.go
Outdated
|
||
// avoid hitting one page limit of mount argument buffer | ||
if m.Type == "overlay" { | ||
options = copyOptions(options) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This copy should be done as part of the next function, and only when necessary
sys/mount_linux.go
Outdated
} | ||
|
||
// read exit status from child thread. | ||
n, err = readlen(p[0], (*byte)(unsafe.Pointer(&errno)), int(unsafe.Sizeof(errno))) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there no other way to do this without a raw syscall? That should only be necessary in the child process
sys/mount_linux.go
Outdated
runtime.LockOSThread() | ||
defer runtime.UnlockOSThread() | ||
|
||
if _, errno = forkAndMountat(dirfd, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you are still missing a waitpid or else we will have zombie babies
sys/mount_linux.go
Outdated
|
||
// open pipe to receive exit status from other thread | ||
p[0], p[1] = -1, -1 | ||
if err = syscall.Pipe(p[:]); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I actually don't think you need pipes where, just waitpid
(wait4
) the exit status and use that. You can always wait on a process, running or not, that you forked off.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I make it complicated and it can cause the zombie process. I have updated the code. Please take a look.
1ca0406
to
7a57b5c
Compare
sys/mount_linux.go
Outdated
return errors.Wrapf(err, "failed to find pid=%d process", pid) | ||
} | ||
|
||
if ps, err = p.Wait(); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i would almost recommend using unix.Wait4
here to follow the rest of the theme of low level syscalls in this function
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
make senses. I will update it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for all your help
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we add loop to retry if the Wait4
return EINTR
? it is possible?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ya, good idea
7a57b5c
to
b9d7839
Compare
|
||
// optionsSize returns the byte size of options of mount. | ||
func optionsSize(opts []string) int { | ||
size := 0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should still set some buffer room here, maybe start size at 512
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the buffer will be used in pagesize check. have updated it.
b9d7839
to
3a3c261
Compare
mount code LGTM |
ping @dmcgowan @stevvooe @AkihiroSuda please take a look~ thanks |
// | ||
// NOTE: 512 is a buffer during pagesize check. | ||
if m.Type == "overlay" && optionsSize(options) >= pagesize-512 { | ||
chdir, options = compactLowerdirOption(options) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like there should be another check here that after compacting the options do fit a page, i.e. something like
if optionsSize(options) >= pagesize-512 {
return errors.Errorf("can't mount: lower layers list too long")
}
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yet better, move this check to after parseMountOptions() as it's simpler and more precise in there:
flags, data := parseMountOptions(options)
if len(data) >= pagesize {
return errors.Errorf("can't mount: mount options string too long")
}
```
or smth like that
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
make senses. will update it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kolyshkin I add another check after compact and show the error if the mount option is too long.
if we got empty chdir
or the data is too long, return the mount options is too long
. It is readable to user instead of failed to mount: no such file or directory
.
Auto-detect longest common dir in lowerdir option and compact it if the option size is hitting one page size. If does, Use chdir + CLONE to do mount thing to avoid hitting one page argument buffer in linux kernel mount. Signed-off-by: Wei Fu <[email protected]>
3a3c261
to
67b54c6
Compare
LGTM |
1 similar comment
LGTM |
Auto-detect longest common dir in lowerdir option and compact it if the
option size is hitting one page size. If does, Use chdir + CLONE to do
mount thing to avoid hitting one page argument buffer in linux kernel
mount.
More information is here #2497