Blame SOURCES/libcgroup-0.41-api.c-fix-order-of-memory-subsystem-parameters.patch

0a7b38
From 72a9e0c3d4f8daca9f7dc389edbc1013d7c0d808 Mon Sep 17 00:00:00 2001
0a7b38
From: =?UTF-8?q?Nikola=20Forr=C3=B3?= <nforro@redhat.com>
0a7b38
Date: Fri, 8 Apr 2016 17:00:19 +0200
0a7b38
Subject: [PATCH] api.c: fix order of memory subsystem parameters generated by
0a7b38
 cgsnapshot
0a7b38
MIME-Version: 1.0
0a7b38
Content-Type: text/plain; charset=UTF-8
0a7b38
Content-Transfer-Encoding: 8bit
0a7b38
0a7b38
Order of parameters usually doesn't matter, but that's not the case with
0a7b38
memory.limit_in_bytes and memory.memsw.limit_in_bytes. When the latter
0a7b38
is first in the list of parameters, the resulting configuration is not
0a7b38
loadable with cgconfigparser.
0a7b38
0a7b38
This happens because when a cgroup is created, both memory.limit_in_bytes
0a7b38
and memory.memsw.limit_in_bytes parameters are initialized to highest
0a7b38
value possible (RESOURCE_MAX). And because memory.memsw.limit_in_bytes
0a7b38
must be always higher or equal to memory.limit_in_bytes, it's impossible
0a7b38
to change its value first.
0a7b38
0a7b38
Make sure that after constructing parameter list of memory subsystem,
0a7b38
the mentioned parameters are in correct order.
0a7b38
0a7b38
Signed-off-by: Nikola Forró <nforro@redhat.com>
0a7b38
---
0a7b38
 src/api.c | 24 ++++++++++++++++++++++++
0a7b38
 1 file changed, 24 insertions(+)
0a7b38
0a7b38
diff --git a/src/api.c b/src/api.c
0a7b38
index 0bf0615..f5da553 100644
0a7b38
--- a/src/api.c
0a7b38
+++ b/src/api.c
0a7b38
@@ -2651,6 +2651,30 @@ int cgroup_get_cgroup(struct cgroup *cgroup)
0a7b38
 			}
0a7b38
 		}
0a7b38
 		closedir(dir);
0a7b38
+
0a7b38
+		if (! strcmp(cgc->name, "memory")) {
0a7b38
+			/*
0a7b38
+			 * Make sure that memory.limit_in_bytes is placed before
0a7b38
+			 * memory.memsw.limit_in_bytes in the list of values
0a7b38
+			 */
0a7b38
+			int memsw_limit = -1;
0a7b38
+			int mem_limit = -1;
0a7b38
+
0a7b38
+			for (j = 0; j < cgc->index; j++) {
0a7b38
+				if (! strcmp(cgc->values[j]->name,
0a7b38
+								"memory.memsw.limit_in_bytes"))
0a7b38
+					memsw_limit = j;
0a7b38
+				else if (! strcmp(cgc->values[j]->name,
0a7b38
+									"memory.limit_in_bytes"))
0a7b38
+					mem_limit = j;
0a7b38
+			}
0a7b38
+
0a7b38
+			if (memsw_limit >= 0 && memsw_limit < mem_limit) {
0a7b38
+				struct control_value *val = cgc->values[memsw_limit];
0a7b38
+				cgc->values[memsw_limit] = cgc->values[mem_limit];
0a7b38
+				cgc->values[mem_limit] = val;
0a7b38
+			}
0a7b38
+		}
0a7b38
 	}
0a7b38
 
0a7b38
 	/* Check if the group really exists or not */
0a7b38
-- 
0a7b38
2.4.11
0a7b38