mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
dc18ef2e51
Using MAINPID breaks systemd's exit detection, as it stops watching the original pid, but is unable to watch the new pid as it is not a child of systemd itself. The best we can do is just notify when execing the child process. We also need to consolidate forking into a sigle place so that we don't end up with multiple levels of child processes if both redirecting log output and reaping child processes. Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
25 lines
688 B
Go
25 lines
688 B
Go
// +build linux,cgo
|
|
|
|
package cmds
|
|
|
|
import (
|
|
"os"
|
|
|
|
"github.com/containerd/containerd/pkg/userns"
|
|
"github.com/pkg/errors"
|
|
"github.com/rootless-containers/rootlesskit/pkg/parent/cgrouputil"
|
|
)
|
|
|
|
// EvacuateCgroup2 will handle evacuating the root cgroup in order to enable subtree_control,
|
|
// if running as pid 1 without rootless support.
|
|
func EvacuateCgroup2() error {
|
|
if os.Getpid() == 1 && !userns.RunningInUserNS() {
|
|
// The root cgroup has to be empty to enable subtree_control, so evacuate it by placing
|
|
// ourselves in the init cgroup.
|
|
if err := cgrouputil.EvacuateCgroup2("init"); err != nil {
|
|
return errors.Wrap(err, "failed to evacuate root cgroup")
|
|
}
|
|
}
|
|
return nil
|
|
}
|