diff options
author | Aleksandr Razumov <a.razumov@corp.mail.ru> | 2019-12-17 20:41:02 +0300 |
---|---|---|
committer | Aleksandr Razumov <a.razumov@corp.mail.ru> | 2019-12-17 20:41:02 +0300 |
commit | 67f678be27b3f4545d41539bd6855527da53a250 (patch) | |
tree | 66d35d45dce0f360c289db9a9943ae5297d1becf /runsc | |
parent | b661434202672f920291bf5685b68772103c66cb (diff) |
Leave minimum CPU number as a constant
Remove introduced CPUNumMin config and hard-code it as 2.
Diffstat (limited to 'runsc')
-rw-r--r-- | runsc/boot/config.go | 10 | ||||
-rw-r--r-- | runsc/main.go | 4 | ||||
-rw-r--r-- | runsc/sandbox/sandbox.go | 9 |
3 files changed, 9 insertions, 14 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go index d9f5b67c0..a878bc2ce 100644 --- a/runsc/boot/config.go +++ b/runsc/boot/config.go @@ -256,12 +256,6 @@ type Config struct { // // E.g. 0.2 CPU quota will result in 1, and 1.9 in 2. CPUNumFromQuota bool - - // CPUNumMin is minimum value of CPU number setting when CPUNumFromQuota - // strategy is active. - // - // E.g. when CPUNumMin is 2, 0.2 CPU quota will result in 2 instead of 1. - CPUNumMin int } // ToFlags returns a slice of flags that correspond to the given Config. @@ -295,9 +289,7 @@ func (c *Config) ToFlags() []string { "--overlayfs-stale-read=" + strconv.FormatBool(c.OverlayfsStaleRead), } if c.CPUNumFromQuota { - f = append(f, "--cpu-num-from-quota", - "--cpu-num-min="+strconv.Itoa(c.CPUNumMin), - ) + f = append(f, "--cpu-num-from-quota") } // Only include these if set since it is never to be used by users. if c.TestOnlyAllowRunAsCurrentUserWithoutChroot { diff --git a/runsc/main.go b/runsc/main.go index 7c60cbb4b..abf929511 100644 --- a/runsc/main.go +++ b/runsc/main.go @@ -82,8 +82,7 @@ var ( numNetworkChannels = flag.Int("num-network-channels", 1, "number of underlying channels(FDs) to use for network link endpoints.") rootless = flag.Bool("rootless", false, "it allows the sandbox to be started with a user that is not root. Sandbox and Gofer processes may run with same privileges as current user.") referenceLeakMode = flag.String("ref-leak-mode", "disabled", "sets reference leak check mode: disabled (default), log-names, log-traces.") - cpuNumFromQuota = flag.Bool("cpu-num-from-quota", false, "set cpu number to cpu quota (least integer greater or equal to quota value)") - cpuNumMin = flag.Int("cpu-num-min", 2, "minimum number of cpu to use with --cpu-num-from-quota") + cpuNumFromQuota = flag.Bool("cpu-num-from-quota", false, "set cpu number to cpu quota (least integer greater or equal to quota value, but not less than 2)") // Test flags, not to be used outside tests, ever. testOnlyAllowRunAsCurrentUserWithoutChroot = flag.Bool("TESTONLY-unsafe-nonroot", false, "TEST ONLY; do not ever use! This skips many security measures that isolate the host from the sandbox.") @@ -228,7 +227,6 @@ func main() { ReferenceLeakMode: refsLeakMode, OverlayfsStaleRead: *overlayfsStaleRead, CPUNumFromQuota: *cpuNumFromQuota, - CPUNumMin: *cpuNumMin, TestOnlyAllowRunAsCurrentUserWithoutChroot: *testOnlyAllowRunAsCurrentUserWithoutChroot, TestOnlyTestNameEnv: *testOnlyTestNameEnv, diff --git a/runsc/sandbox/sandbox.go b/runsc/sandbox/sandbox.go index f6feadf75..ce1452b87 100644 --- a/runsc/sandbox/sandbox.go +++ b/runsc/sandbox/sandbox.go @@ -633,13 +633,18 @@ func (s *Sandbox) createSandboxProcess(conf *boot.Config, args *Args, startSyncF return fmt.Errorf("getting cpu count from cgroups: %v", err) } if conf.CPUNumFromQuota { + // Dropping below 2 CPUs can trigger application to disable + // locks that can lead do hard to debug errors, so just + // leaving two cores as reasonable default. + const minCPUs = 2 + quota, err := s.Cgroup.CPUQuota() if err != nil { return fmt.Errorf("getting cpu qouta from cgroups: %v", err) } if n := int(math.Ceil(quota)); n > 0 { - if n < conf.CPUNumMin { - n = conf.CPUNumMin + if n < minCPUs { + n = minCPUs } if n < cpuNum { // Only lower the cpu number. |