Windows: DetachVhd attempt in cleanup
Signed-off-by: John Howard <jhoward@microsoft.com> This is a fix for a few related scenarios where it's impossible to remove layers or containers until the host is rebooted. Generally (or at least easiest to repro) through a forced daemon kill while a container is running. Possibly slightly worse than that, as following a host reboot, the scratch layer would possibly be leaked and left on disk under the dataroot\windowsfilter directory after the container is removed. One such example of a failure: 1. run a long running container with the --rm flag docker run --rm -d --name test microsoft/windowsservercore powershell sleep 30 2. Force kill the daemon not allowing it to cleanup. Simulates a crash or a host power-cycle. 3. (re-)Start daemon 4. docker ps -a PS C:\control> docker ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 7aff773d782b malloc "powershell start-sl…" 11 seconds ago Removal In Progress malloc 5. Try to remove PS C:\control> docker rm 7aff Error response from daemon: container 7aff773d782bbf35d95095369ffcb170b7b8f0e6f8f65d5aff42abf61234855d: driver "windowsfilter" failed to remove root filesystem: rename C:\control\windowsfilter\7aff773d782bbf35d95095369ffcb170b7b8f0e6f8f65d5aff42abf61234855d C:\control\windowsfilter\7aff773d782bbf35d95095369ffcb170b7b8f0e6f8f65d5aff42abf61234855d-removing: Access is denied. PS C:\control> Step 5 fails.
This commit is contained in:
parent
66966941f9
commit
efdad53744
1 changed files with 14 additions and 2 deletions
|
@ -6,7 +6,6 @@ import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
@ -23,6 +22,7 @@ import (
|
||||||
"github.com/Microsoft/go-winio"
|
"github.com/Microsoft/go-winio"
|
||||||
"github.com/Microsoft/go-winio/archive/tar"
|
"github.com/Microsoft/go-winio/archive/tar"
|
||||||
"github.com/Microsoft/go-winio/backuptar"
|
"github.com/Microsoft/go-winio/backuptar"
|
||||||
|
"github.com/Microsoft/go-winio/vhd"
|
||||||
"github.com/Microsoft/hcsshim"
|
"github.com/Microsoft/hcsshim"
|
||||||
"github.com/docker/docker/daemon/graphdriver"
|
"github.com/docker/docker/daemon/graphdriver"
|
||||||
"github.com/docker/docker/pkg/archive"
|
"github.com/docker/docker/pkg/archive"
|
||||||
|
@ -33,6 +33,7 @@ import (
|
||||||
"github.com/docker/docker/pkg/reexec"
|
"github.com/docker/docker/pkg/reexec"
|
||||||
"github.com/docker/docker/pkg/system"
|
"github.com/docker/docker/pkg/system"
|
||||||
units "github.com/docker/go-units"
|
units "github.com/docker/go-units"
|
||||||
|
"github.com/pkg/errors"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
"golang.org/x/sys/windows"
|
"golang.org/x/sys/windows"
|
||||||
)
|
)
|
||||||
|
@ -331,7 +332,18 @@ func (d *Driver) Remove(id string) error {
|
||||||
tmpID := fmt.Sprintf("%s-removing", rID)
|
tmpID := fmt.Sprintf("%s-removing", rID)
|
||||||
tmpLayerPath := filepath.Join(d.info.HomeDir, tmpID)
|
tmpLayerPath := filepath.Join(d.info.HomeDir, tmpID)
|
||||||
if err := os.Rename(layerPath, tmpLayerPath); err != nil && !os.IsNotExist(err) {
|
if err := os.Rename(layerPath, tmpLayerPath); err != nil && !os.IsNotExist(err) {
|
||||||
return err
|
if !os.IsPermission(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// If permission denied, it's possible that the scratch is still mounted, an
|
||||||
|
// artifact after a hard daemon crash for example. Worth a shot to try detaching it
|
||||||
|
// before retrying the rename.
|
||||||
|
if detachErr := vhd.DetachVhd(filepath.Join(layerPath, "sandbox.vhdx")); detachErr != nil {
|
||||||
|
return errors.Wrapf(err, "failed to detach VHD: %s", detachErr)
|
||||||
|
}
|
||||||
|
if renameErr := os.Rename(layerPath, tmpLayerPath); renameErr != nil && !os.IsNotExist(renameErr) {
|
||||||
|
return errors.Wrapf(err, "second rename attempt following detach failed: %s", renameErr)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if err := hcsshim.DestroyLayer(d.info, tmpID); err != nil {
|
if err := hcsshim.DestroyLayer(d.info, tmpID); err != nil {
|
||||||
logrus.Errorf("Failed to DestroyLayer %s: %s", id, err)
|
logrus.Errorf("Failed to DestroyLayer %s: %s", id, err)
|
||||||
|
|
Loading…
Reference in a new issue