Relevant changes: - containerd/containerd#51 Fix empty device type - containerd/containerd#52 Remove call to unitName - Calling unitName incorrectly appends -slice onto the end of the slice cgroup we are looking for - addresses containerd/containerd#47 cgroups: cgroup deleted - containerd/containerd#53 systemd-239+ no longer allows delegate slice - containerd/containerd#54 Bugfix: can't write to cpuset cgroup - containerd/containerd#63 Makes Load function more lenient on subsystems' checking - addresses containerd/containerd#58 Very strict checking of subsystems' existence while loading cgroup - containerd/containerd#67 Add functionality for retrieving all tasks of a cgroup - containerd/containerd#68 Fix net_prio typo - containerd/containerd#69 Blkio weight/leafWeight pointer value - containerd/containerd#77 Check for non-active/supported cgroups - addresses containerd/containerd#76 unable to find * in controller set: unknown - addresses docker/for-linux#545 Raspbian: Error response from daemon: unable to find "net_prio" in controller set: unknown - addresses docker/for-linux#552 Error response from daemon: unable to find "cpuacct" in controller set: unknown - addresses docker/for-linux#545 Raspbian: Error response from daemon: unable to find "net_prio" in controller set: unknown Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 386b06eacd689bb98fb4117087614466c6e130f3) Signed-off-by: Sebastiaan van Stijn <github@gone.nl> Upstream-commit: a36f6bfc36d2425c693097102b91152fa8f80012 Component: engine
94 lines
2.1 KiB
Go
94 lines
2.1 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cgroups
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
)
|
|
|
|
const (
|
|
allowDeviceFile = "devices.allow"
|
|
denyDeviceFile = "devices.deny"
|
|
wildcard = -1
|
|
)
|
|
|
|
func NewDevices(root string) *devicesController {
|
|
return &devicesController{
|
|
root: filepath.Join(root, string(Devices)),
|
|
}
|
|
}
|
|
|
|
type devicesController struct {
|
|
root string
|
|
}
|
|
|
|
func (d *devicesController) Name() Name {
|
|
return Devices
|
|
}
|
|
|
|
func (d *devicesController) Path(path string) string {
|
|
return filepath.Join(d.root, path)
|
|
}
|
|
|
|
func (d *devicesController) Create(path string, resources *specs.LinuxResources) error {
|
|
if err := os.MkdirAll(d.Path(path), defaultDirPerm); err != nil {
|
|
return err
|
|
}
|
|
for _, device := range resources.Devices {
|
|
file := denyDeviceFile
|
|
if device.Allow {
|
|
file = allowDeviceFile
|
|
}
|
|
if device.Type == "" {
|
|
device.Type = "a"
|
|
}
|
|
if err := ioutil.WriteFile(
|
|
filepath.Join(d.Path(path), file),
|
|
[]byte(deviceString(device)),
|
|
defaultFilePerm,
|
|
); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (d *devicesController) Update(path string, resources *specs.LinuxResources) error {
|
|
return d.Create(path, resources)
|
|
}
|
|
|
|
func deviceString(device specs.LinuxDeviceCgroup) string {
|
|
return fmt.Sprintf("%s %s:%s %s",
|
|
device.Type,
|
|
deviceNumber(device.Major),
|
|
deviceNumber(device.Minor),
|
|
device.Access,
|
|
)
|
|
}
|
|
|
|
func deviceNumber(number *int64) string {
|
|
if number == nil || *number == wildcard {
|
|
return "*"
|
|
}
|
|
return fmt.Sprint(*number)
|
|
}
|