| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477 |
- package systemd
- import (
- "errors"
- "os"
- "path/filepath"
- "reflect"
- "strings"
- "sync"
- systemdDbus "github.com/coreos/go-systemd/v22/dbus"
- "github.com/godbus/dbus/v5"
- "github.com/sirupsen/logrus"
- "github.com/opencontainers/runc/libcontainer/cgroups"
- "github.com/opencontainers/runc/libcontainer/cgroups/fs"
- "github.com/opencontainers/runc/libcontainer/configs"
- )
- type legacyManager struct {
- mu sync.Mutex
- cgroups *configs.Cgroup
- paths map[string]string
- dbus *dbusConnManager
- }
- func NewLegacyManager(cg *configs.Cgroup, paths map[string]string) (cgroups.Manager, error) {
- if cg.Rootless {
- return nil, errors.New("cannot use rootless systemd cgroups manager on cgroup v1")
- }
- if cg.Resources != nil && cg.Resources.Unified != nil {
- return nil, cgroups.ErrV1NoUnified
- }
- if paths == nil {
- var err error
- paths, err = initPaths(cg)
- if err != nil {
- return nil, err
- }
- }
- return &legacyManager{
- cgroups: cg,
- paths: paths,
- dbus: newDbusConnManager(false),
- }, nil
- }
- type subsystem interface {
- // Name returns the name of the subsystem.
- Name() string
- // Returns the stats, as 'stats', corresponding to the cgroup under 'path'.
- GetStats(path string, stats *cgroups.Stats) error
- // Set sets cgroup resource limits.
- Set(path string, r *configs.Resources) error
- }
- var errSubsystemDoesNotExist = errors.New("cgroup: subsystem does not exist")
- var legacySubsystems = []subsystem{
- &fs.CpusetGroup{},
- &fs.DevicesGroup{},
- &fs.MemoryGroup{},
- &fs.CpuGroup{},
- &fs.CpuacctGroup{},
- &fs.PidsGroup{},
- &fs.BlkioGroup{},
- &fs.HugetlbGroup{},
- &fs.PerfEventGroup{},
- &fs.FreezerGroup{},
- &fs.NetPrioGroup{},
- &fs.NetClsGroup{},
- &fs.NameGroup{GroupName: "name=systemd"},
- &fs.RdmaGroup{},
- }
- func genV1ResourcesProperties(r *configs.Resources, cm *dbusConnManager) ([]systemdDbus.Property, error) {
- var properties []systemdDbus.Property
- deviceProperties, err := generateDeviceProperties(r)
- if err != nil {
- return nil, err
- }
- properties = append(properties, deviceProperties...)
- if r.Memory != 0 {
- properties = append(properties,
- newProp("MemoryLimit", uint64(r.Memory)))
- }
- if r.CpuShares != 0 {
- properties = append(properties,
- newProp("CPUShares", r.CpuShares))
- }
- addCpuQuota(cm, &properties, r.CpuQuota, r.CpuPeriod)
- if r.BlkioWeight != 0 {
- properties = append(properties,
- newProp("BlockIOWeight", uint64(r.BlkioWeight)))
- }
- if r.PidsLimit > 0 || r.PidsLimit == -1 {
- properties = append(properties,
- newProp("TasksMax", uint64(r.PidsLimit)))
- }
- err = addCpuset(cm, &properties, r.CpusetCpus, r.CpusetMems)
- if err != nil {
- return nil, err
- }
- return properties, nil
- }
- // initPaths figures out and returns paths to cgroups.
- func initPaths(c *configs.Cgroup) (map[string]string, error) {
- slice := "system.slice"
- if c.Parent != "" {
- var err error
- slice, err = ExpandSlice(c.Parent)
- if err != nil {
- return nil, err
- }
- }
- unit := getUnitName(c)
- paths := make(map[string]string)
- for _, s := range legacySubsystems {
- subsystemPath, err := getSubsystemPath(slice, unit, s.Name())
- if err != nil {
- // Even if it's `not found` error, we'll return err
- // because devices cgroup is hard requirement for
- // container security.
- if s.Name() == "devices" {
- return nil, err
- }
- // Don't fail if a cgroup hierarchy was not found, just skip this subsystem
- if cgroups.IsNotFound(err) {
- continue
- }
- return nil, err
- }
- paths[s.Name()] = subsystemPath
- }
- // If systemd is using cgroups-hybrid mode then add the slice path of
- // this container to the paths so the following process executed with
- // "runc exec" joins that cgroup as well.
- if cgroups.IsCgroup2HybridMode() {
- // "" means cgroup-hybrid path
- cgroupsHybridPath, err := getSubsystemPath(slice, unit, "")
- if err != nil && cgroups.IsNotFound(err) {
- return nil, err
- }
- paths[""] = cgroupsHybridPath
- }
- return paths, nil
- }
- func (m *legacyManager) Apply(pid int) error {
- var (
- c = m.cgroups
- unitName = getUnitName(c)
- slice = "system.slice"
- properties []systemdDbus.Property
- )
- m.mu.Lock()
- defer m.mu.Unlock()
- if c.Parent != "" {
- slice = c.Parent
- }
- properties = append(properties, systemdDbus.PropDescription("libcontainer container "+c.Name))
- if strings.HasSuffix(unitName, ".slice") {
- // If we create a slice, the parent is defined via a Wants=.
- properties = append(properties, systemdDbus.PropWants(slice))
- } else {
- // Otherwise it's a scope, which we put into a Slice=.
- properties = append(properties, systemdDbus.PropSlice(slice))
- // Assume scopes always support delegation (supported since systemd v218).
- properties = append(properties, newProp("Delegate", true))
- }
- // only add pid if its valid, -1 is used w/ general slice creation.
- if pid != -1 {
- properties = append(properties, newProp("PIDs", []uint32{uint32(pid)}))
- }
- // Always enable accounting, this gets us the same behaviour as the fs implementation,
- // plus the kernel has some problems with joining the memory cgroup at a later time.
- properties = append(properties,
- newProp("MemoryAccounting", true),
- newProp("CPUAccounting", true),
- newProp("BlockIOAccounting", true),
- newProp("TasksAccounting", true),
- )
- // Assume DefaultDependencies= will always work (the check for it was previously broken.)
- properties = append(properties,
- newProp("DefaultDependencies", false))
- properties = append(properties, c.SystemdProps...)
- if err := startUnit(m.dbus, unitName, properties); err != nil {
- return err
- }
- if err := m.joinCgroups(pid); err != nil {
- return err
- }
- return nil
- }
- func (m *legacyManager) Destroy() error {
- m.mu.Lock()
- defer m.mu.Unlock()
- stopErr := stopUnit(m.dbus, getUnitName(m.cgroups))
- // Both on success and on error, cleanup all the cgroups
- // we are aware of, as some of them were created directly
- // by Apply() and are not managed by systemd.
- if err := cgroups.RemovePaths(m.paths); err != nil && stopErr == nil {
- return err
- }
- return stopErr
- }
- func (m *legacyManager) Path(subsys string) string {
- m.mu.Lock()
- defer m.mu.Unlock()
- return m.paths[subsys]
- }
- func (m *legacyManager) joinCgroups(pid int) error {
- for _, sys := range legacySubsystems {
- name := sys.Name()
- switch name {
- case "name=systemd":
- // let systemd handle this
- case "cpuset":
- if path, ok := m.paths[name]; ok {
- s := &fs.CpusetGroup{}
- if err := s.ApplyDir(path, m.cgroups.Resources, pid); err != nil {
- return err
- }
- }
- default:
- if path, ok := m.paths[name]; ok {
- if err := os.MkdirAll(path, 0o755); err != nil {
- return err
- }
- if err := cgroups.WriteCgroupProc(path, pid); err != nil {
- return err
- }
- }
- }
- }
- return nil
- }
- func getSubsystemPath(slice, unit, subsystem string) (string, error) {
- mountpoint, err := cgroups.FindCgroupMountpoint("", subsystem)
- if err != nil {
- return "", err
- }
- initPath, err := cgroups.GetInitCgroup(subsystem)
- if err != nil {
- return "", err
- }
- // if pid 1 is systemd 226 or later, it will be in init.scope, not the root
- initPath = strings.TrimSuffix(filepath.Clean(initPath), "init.scope")
- return filepath.Join(mountpoint, initPath, slice, unit), nil
- }
- func (m *legacyManager) Freeze(state configs.FreezerState) error {
- err := m.doFreeze(state)
- if err == nil {
- m.cgroups.Resources.Freezer = state
- }
- return err
- }
- // doFreeze is the same as Freeze but without
- // changing the m.cgroups.Resources.Frozen field.
- func (m *legacyManager) doFreeze(state configs.FreezerState) error {
- path, ok := m.paths["freezer"]
- if !ok {
- return errSubsystemDoesNotExist
- }
- freezer := &fs.FreezerGroup{}
- resources := &configs.Resources{Freezer: state}
- return freezer.Set(path, resources)
- }
- func (m *legacyManager) GetPids() ([]int, error) {
- path, ok := m.paths["devices"]
- if !ok {
- return nil, errSubsystemDoesNotExist
- }
- return cgroups.GetPids(path)
- }
- func (m *legacyManager) GetAllPids() ([]int, error) {
- path, ok := m.paths["devices"]
- if !ok {
- return nil, errSubsystemDoesNotExist
- }
- return cgroups.GetAllPids(path)
- }
- func (m *legacyManager) GetStats() (*cgroups.Stats, error) {
- m.mu.Lock()
- defer m.mu.Unlock()
- stats := cgroups.NewStats()
- for _, sys := range legacySubsystems {
- path := m.paths[sys.Name()]
- if path == "" {
- continue
- }
- if err := sys.GetStats(path, stats); err != nil {
- return nil, err
- }
- }
- return stats, nil
- }
- // freezeBeforeSet answers whether there is a need to freeze the cgroup before
- // applying its systemd unit properties, and thaw after, while avoiding
- // unnecessary freezer state changes.
- //
- // The reason why we have to freeze is that systemd's application of device
- // rules is done disruptively, resulting in spurious errors to common devices
- // (unlike our fs driver, they will happily write deny-all rules to running
- // containers). So we have to freeze the container to avoid the container get
- // an occasional "permission denied" error.
- func (m *legacyManager) freezeBeforeSet(unitName string, r *configs.Resources) (needsFreeze, needsThaw bool, err error) {
- // Special case for SkipDevices, as used by Kubernetes to create pod
- // cgroups with allow-all device policy).
- if r.SkipDevices {
- if r.SkipFreezeOnSet {
- // Both needsFreeze and needsThaw are false.
- return
- }
- // No need to freeze if SkipDevices is set, and either
- // (1) systemd unit does not (yet) exist, or
- // (2) it has DevicePolicy=auto and empty DeviceAllow list.
- //
- // Interestingly, (1) and (2) are the same here because
- // a non-existent unit returns default properties,
- // and settings in (2) are the defaults.
- //
- // Do not return errors from getUnitTypeProperty, as they alone
- // should not prevent Set from working.
- unitType := getUnitType(unitName)
- devPolicy, e := getUnitTypeProperty(m.dbus, unitName, unitType, "DevicePolicy")
- if e == nil && devPolicy.Value == dbus.MakeVariant("auto") {
- devAllow, e := getUnitTypeProperty(m.dbus, unitName, unitType, "DeviceAllow")
- if e == nil {
- if rv := reflect.ValueOf(devAllow.Value.Value()); rv.Kind() == reflect.Slice && rv.Len() == 0 {
- needsFreeze = false
- needsThaw = false
- return
- }
- }
- }
- }
- needsFreeze = true
- needsThaw = true
- // Check the current freezer state.
- freezerState, err := m.GetFreezerState()
- if err != nil {
- return
- }
- if freezerState == configs.Frozen {
- // Already frozen, and should stay frozen.
- needsFreeze = false
- needsThaw = false
- }
- if r.Freezer == configs.Frozen {
- // Will be frozen anyway -- no need to thaw.
- needsThaw = false
- }
- return
- }
- func (m *legacyManager) Set(r *configs.Resources) error {
- if r == nil {
- return nil
- }
- if r.Unified != nil {
- return cgroups.ErrV1NoUnified
- }
- properties, err := genV1ResourcesProperties(r, m.dbus)
- if err != nil {
- return err
- }
- unitName := getUnitName(m.cgroups)
- needsFreeze, needsThaw, err := m.freezeBeforeSet(unitName, r)
- if err != nil {
- return err
- }
- if needsFreeze {
- if err := m.doFreeze(configs.Frozen); err != nil {
- // If freezer cgroup isn't supported, we just warn about it.
- logrus.Infof("freeze container before SetUnitProperties failed: %v", err)
- }
- }
- setErr := setUnitProperties(m.dbus, unitName, properties...)
- if needsThaw {
- if err := m.doFreeze(configs.Thawed); err != nil {
- logrus.Infof("thaw container after SetUnitProperties failed: %v", err)
- }
- }
- if setErr != nil {
- return setErr
- }
- for _, sys := range legacySubsystems {
- // Get the subsystem path, but don't error out for not found cgroups.
- path, ok := m.paths[sys.Name()]
- if !ok {
- continue
- }
- if err := sys.Set(path, r); err != nil {
- return err
- }
- }
- return nil
- }
- func (m *legacyManager) GetPaths() map[string]string {
- m.mu.Lock()
- defer m.mu.Unlock()
- return m.paths
- }
- func (m *legacyManager) GetCgroups() (*configs.Cgroup, error) {
- return m.cgroups, nil
- }
- func (m *legacyManager) GetFreezerState() (configs.FreezerState, error) {
- path, ok := m.paths["freezer"]
- if !ok {
- return configs.Undefined, nil
- }
- freezer := &fs.FreezerGroup{}
- return freezer.GetState(path)
- }
- func (m *legacyManager) Exists() bool {
- return cgroups.PathExists(m.Path("devices"))
- }
- func (m *legacyManager) OOMKillCount() (uint64, error) {
- return fs.OOMKillCount(m.Path("memory"))
- }
|