mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
386b06eacd
Relevant changes: - containerd/containerd#51 Fix empty device type - containerd/containerd#52 Remove call to unitName - Calling unitName incorrectly appends -slice onto the end of the slice cgroup we are looking for - addresses containerd/containerd#47 cgroups: cgroup deleted - containerd/containerd#53 systemd-239+ no longer allows delegate slice - containerd/containerd#54 Bugfix: can't write to cpuset cgroup - containerd/containerd#63 Makes Load function more lenient on subsystems' checking - addresses containerd/containerd#58 Very strict checking of subsystems' existence while loading cgroup - containerd/containerd#67 Add functionality for retrieving all tasks of a cgroup - containerd/containerd#68 Fix net_prio typo - containerd/containerd#69 Blkio weight/leafWeight pointer value - containerd/containerd#77 Check for non-active/supported cgroups - addresses containerd/containerd#76 unable to find * in controller set: unknown - addresses docker/for-linux#545 Raspbian: Error response from daemon: unable to find "net_prio" in controller set: unknown - addresses docker/for-linux#552 Error response from daemon: unable to find "cpuacct" in controller set: unknown - addresses docker/for-linux#545 Raspbian: Error response from daemon: unable to find "net_prio" in controller set: unknown Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
66 lines
1.6 KiB
Go
66 lines
1.6 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cgroups
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
)
|
|
|
|
func NewNetPrio(root string) *netprioController {
|
|
return &netprioController{
|
|
root: filepath.Join(root, string(NetPrio)),
|
|
}
|
|
}
|
|
|
|
type netprioController struct {
|
|
root string
|
|
}
|
|
|
|
func (n *netprioController) Name() Name {
|
|
return NetPrio
|
|
}
|
|
|
|
func (n *netprioController) Path(path string) string {
|
|
return filepath.Join(n.root, path)
|
|
}
|
|
|
|
func (n *netprioController) Create(path string, resources *specs.LinuxResources) error {
|
|
if err := os.MkdirAll(n.Path(path), defaultDirPerm); err != nil {
|
|
return err
|
|
}
|
|
if resources.Network != nil {
|
|
for _, prio := range resources.Network.Priorities {
|
|
if err := ioutil.WriteFile(
|
|
filepath.Join(n.Path(path), "net_prio.ifpriomap"),
|
|
formatPrio(prio.Name, prio.Priority),
|
|
defaultFilePerm,
|
|
); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func formatPrio(name string, prio uint32) []byte {
|
|
return []byte(fmt.Sprintf("%s %d", name, prio))
|
|
}
|