diff options
author | Ian Lewis <ianlewis@google.com> | 2019-08-01 18:47:55 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2019-08-01 18:49:21 -0700 |
commit | 3eff0531adc6d28eea49be65fa747e2b3163f44d (patch) | |
tree | 741ebe9f48575b4b1ca6178dc862a2d4faa997f8 /runsc | |
parent | bad43772a1c3d0b2a755ab38caae12b6542fe7a2 (diff) |
Set sandbox oom_score_adj
Set /proc/self/oom_score_adj based on oomScoreAdj specified in the OCI bundle.
When new containers are added to the sandbox oom_score_adj for the sandbox and
all other gofers are adjusted so that oom_score_adj is equal to the lowest
oom_score_adj of all containers in the sandbox.
Fixes #512
PiperOrigin-RevId: 261242725
Diffstat (limited to 'runsc')
-rw-r--r-- | runsc/container/container.go | 95 | ||||
-rw-r--r-- | runsc/sandbox/sandbox.go | 2 |
2 files changed, 95 insertions, 2 deletions
diff --git a/runsc/container/container.go b/runsc/container/container.go index 8320bb2ca..27e9c2e0f 100644 --- a/runsc/container/container.go +++ b/runsc/container/container.go @@ -475,7 +475,13 @@ func (c *Container) Start(conf *boot.Config) error { } c.changeStatus(Running) - return c.save() + if err := c.save(); err != nil { + return err + } + + // Adjust the oom_score_adj for sandbox and gofers. This must be done after + // save(). + return c.adjustOOMScoreAdj(conf) } // Restore takes a container and replaces its kernel and file system @@ -1098,3 +1104,90 @@ func runInCgroup(cg *cgroup.Cgroup, fn func() error) error { } return fn() } + +// adjustOOMScoreAdj sets the oom_score_adj for the sandbox and all gofers. +// oom_score_adj is set to the lowest oom_score_adj among the containers +// running in the sandbox. +func (c *Container) adjustOOMScoreAdj(conf *boot.Config) error { + // If this container's OOMScoreAdj is nil then we can exit early as no + // change should be made to oom_score_adj for the sandbox. + if c.Spec.Process.OOMScoreAdj == nil { + return nil + } + + ids, err := List(conf.RootDir) + if err != nil { + return err + } + + // Load the container metadata. + var containers []*Container + for _, id := range ids { + container, err := Load(conf.RootDir, id) + if err != nil { + return fmt.Errorf("loading container %q: %v", id, err) + } + if container.Sandbox.ID == c.Sandbox.ID { + containers = append(containers, container) + } + } + + // Get the lowest score for all containers. + var lowScore int + scoreFound := false + for _, container := range containers { + if container.Spec.Process.OOMScoreAdj != nil && (!scoreFound || *container.Spec.Process.OOMScoreAdj < lowScore) { + scoreFound = true + lowScore = *container.Spec.Process.OOMScoreAdj + } + } + + // Only set oom_score_adj if one of the containers has oom_score_adj set + // in the OCI bundle. If not, we need to inherit the parent process's + // oom_score_adj. + // See: https://github.com/opencontainers/runtime-spec/blob/master/config.md#linux-process + if !scoreFound { + return nil + } + + // Set oom_score_adj for the sandbox. + if err := setOOMScoreAdj(c.Sandbox.Pid, lowScore); err != nil { + return fmt.Errorf("setting oom_score_adj for sandbox %q: %v", c.Sandbox.ID, err) + } + + // Set the gofer's oom_score_adj to the minimum of -500 and the + // sandbox's oom_score_adj to better ensure that the sandbox is killed + // before the gofer. + // + // TODO(gvisor.dev/issue/601) Set oom_score_adj for the gofer to + // the same oom_score_adj as the sandbox. + goferScoreAdj := -500 + if lowScore < goferScoreAdj { + goferScoreAdj = lowScore + } + + // Set oom_score_adj for gofers for all containers in the sandbox. + for _, container := range containers { + err := setOOMScoreAdj(container.GoferPid, goferScoreAdj) + if err != nil { + return fmt.Errorf("setting oom_score_adj for container %q: %v", container.ID, err) + } + } + + return nil +} + +// setOOMScoreAdj sets oom_score_adj to the given value for the given PID. +// /proc must be available and mounted read-write. scoreAdj should be between +// -1000 and 1000. +func setOOMScoreAdj(pid int, scoreAdj int) error { + f, err := os.OpenFile(fmt.Sprintf("/proc/%d/oom_score_adj", pid), os.O_WRONLY, 0644) + if err != nil { + return err + } + defer f.Close() + if _, err := f.WriteString(strconv.Itoa(scoreAdj)); err != nil { + return err + } + return nil +} diff --git a/runsc/sandbox/sandbox.go b/runsc/sandbox/sandbox.go index 4a11f617d..851b1304b 100644 --- a/runsc/sandbox/sandbox.go +++ b/runsc/sandbox/sandbox.go @@ -54,7 +54,7 @@ type Sandbox struct { // ID as the first container run in the sandbox. ID string `json:"id"` - // Pid is the pid of the running sandbox (immutable). May be 0 is the sandbox + // Pid is the pid of the running sandbox (immutable). May be 0 if the sandbox // is not running. Pid int `json:"pid"` |