1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104
|
// Copyright 2021 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package cgroupfs
import (
"bytes"
"fmt"
"math"
"gvisor.dev/gvisor/pkg/abi/linux"
"gvisor.dev/gvisor/pkg/atomicbitops"
"gvisor.dev/gvisor/pkg/context"
"gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs"
"gvisor.dev/gvisor/pkg/sentry/kernel"
"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
"gvisor.dev/gvisor/pkg/sentry/usage"
)
// +stateify savable
type memoryController struct {
controllerCommon
controllerStateless
controllerNoResource
limitBytes atomicbitops.Int64
softLimitBytes atomicbitops.Int64
moveChargeAtImmigrate atomicbitops.Int64
pressureLevel int64
}
var _ controller = (*memoryController)(nil)
func newMemoryController(fs *filesystem, defaults map[string]int64) *memoryController {
c := &memoryController{
// Linux sets these limits to (PAGE_COUNTER_MAX * PAGE_SIZE) by default,
// which is ~ 2**63 on a 64-bit system. So essentially, inifinity. The
// exact value isn't very important.
limitBytes: atomicbitops.FromInt64(math.MaxInt64),
softLimitBytes: atomicbitops.FromInt64(math.MaxInt64),
}
consumeDefault := func(name string, valPtr *atomicbitops.Int64) {
if val, ok := defaults[name]; ok {
valPtr.Store(val)
delete(defaults, name)
}
}
consumeDefault("memory.limit_in_bytes", &c.limitBytes)
consumeDefault("memory.soft_limit_in_bytes", &c.softLimitBytes)
consumeDefault("memory.move_charge_at_immigrate", &c.moveChargeAtImmigrate)
c.controllerCommon.init(kernel.CgroupControllerMemory, fs)
return c
}
// Clone implements controller.Clone.
func (c *memoryController) Clone() controller {
new := &memoryController{
limitBytes: atomicbitops.FromInt64(c.limitBytes.Load()),
softLimitBytes: atomicbitops.FromInt64(c.softLimitBytes.Load()),
moveChargeAtImmigrate: atomicbitops.FromInt64(c.moveChargeAtImmigrate.Load()),
}
new.controllerCommon.cloneFromParent(c)
return new
}
// AddControlFiles implements controller.AddControlFiles.
func (c *memoryController) AddControlFiles(ctx context.Context, creds *auth.Credentials, _ *cgroupInode, contents map[string]kernfs.Inode) {
contents["memory.usage_in_bytes"] = c.fs.newControllerFile(ctx, creds, &memoryUsageInBytesData{}, true)
contents["memory.limit_in_bytes"] = c.fs.newStubControllerFile(ctx, creds, &c.limitBytes, true)
contents["memory.soft_limit_in_bytes"] = c.fs.newStubControllerFile(ctx, creds, &c.softLimitBytes, true)
contents["memory.move_charge_at_immigrate"] = c.fs.newStubControllerFile(ctx, creds, &c.moveChargeAtImmigrate, true)
contents["memory.pressure_level"] = c.fs.newStaticControllerFile(ctx, creds, linux.FileMode(0644), fmt.Sprintf("%d\n", c.pressureLevel))
}
// +stateify savable
type memoryUsageInBytesData struct{}
// Generate implements vfs.DynamicBytesSource.Generate.
func (d *memoryUsageInBytesData) Generate(ctx context.Context, buf *bytes.Buffer) error {
// TODO(b/183151557): This is a giant hack, we're using system-wide
// accounting since we know there is only one cgroup.
k := kernel.KernelFromContext(ctx)
mf := k.MemoryFile()
mf.UpdateUsage()
_, totalBytes := usage.MemoryAccounting.Copy()
fmt.Fprintf(buf, "%d\n", totalBytes)
return nil
}
|