1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73
|
// Copyright (c) 2022, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package cgroups
import (
"fmt"
"os"
"path/filepath"
"strconv"
lccgroups "github.com/opencontainers/runc/libcontainer/cgroups"
)
const unifiedMountPoint = "/sys/fs/cgroup"
// pidToPath returns the path of the cgroup containing process ID pid.
// It is assumed that for v1 cgroups the devices controller is in use.
func pidToPath(pid int) (path string, err error) {
if pid == 0 {
return "", fmt.Errorf("must provide a valid pid")
}
pidCGFile := fmt.Sprintf("/proc/%d/cgroup", pid)
paths, err := lccgroups.ParseCgroupFile(pidCGFile)
if err != nil {
return "", fmt.Errorf("cannot read %s: %w", pidCGFile, err)
}
// cgroups v2 path is always given by the unified "" subsystem
ok := false
if lccgroups.IsCgroup2UnifiedMode() {
path, ok := paths[""]
if !ok {
return "", fmt.Errorf("could not find cgroups v2 unified path")
}
return path, nil
}
// For cgroups v1 we are relying on fetching the 'devices' subsystem path.
// The devices subsystem is needed for our OCI engine and its presence is
// enforced in runc/libcontainer/cgroups/fs initialization without 'skipDevices'.
// This means we never explicitly put a container into a cgroup without a
// set 'devices' path.
path, ok = paths["devices"]
if !ok {
return "", fmt.Errorf("could not find cgroups v1 path (using devices subsystem)")
}
return path, nil
}
// DefaultPathForPid returns a default cgroup path for a given PID.
func DefaultPathForPid(systemd bool, pid int) (group string) {
// Default naming is pid of first process added to cgroup.
strPid := strconv.Itoa(pid)
// Request is for an empty cgroup... name it for the requestor's (our) pid.
if pid == -1 {
strPid = "parent-" + strconv.Itoa(os.Getpid())
}
if systemd {
if os.Getuid() == 0 {
group = "system.slice:singularity:" + strPid
} else {
group = "user.slice:singularity:" + strPid
}
} else {
group = filepath.Join("/singularity", strPid)
}
return group
}
|