cgroup.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382
  1. package worker
  2. import (
  3. "errors"
  4. "fmt"
  5. "io/ioutil"
  6. "os"
  7. "os/exec"
  8. "path/filepath"
  9. "syscall"
  10. "time"
  11. "golang.org/x/sys/unix"
  12. "github.com/moby/moby/pkg/reexec"
  13. cgv1 "github.com/containerd/cgroups"
  14. cgv2 "github.com/containerd/cgroups/v2"
  15. contspecs "github.com/opencontainers/runtime-spec/specs-go"
  16. )
  17. type cgroupHook struct {
  18. emptyHook
  19. cgCfg cgroupConfig
  20. memLimit MemBytes
  21. cgMgrV1 cgv1.Cgroup
  22. cgMgrV2 *cgv2.Manager
  23. }
  24. type execCmd string
  25. const (
  26. cmdCont execCmd = "cont"
  27. cmdAbrt execCmd = "abrt"
  28. )
  29. func init () {
  30. reexec.Register("tunasync-exec", waitExec)
  31. }
  32. func waitExec () {
  33. binary, err := exec.LookPath(os.Args[1])
  34. if err != nil {
  35. panic(err)
  36. }
  37. pipe := os.NewFile(3, "pipe")
  38. if pipe != nil {
  39. if _, err := pipe.Stat(); err == nil {
  40. cmdBytes, err := ioutil.ReadAll(pipe)
  41. if err != nil {
  42. panic(err)
  43. }
  44. if err := pipe.Close(); err != nil {
  45. }
  46. cmd := execCmd(string(cmdBytes))
  47. switch cmd {
  48. case cmdAbrt:
  49. fallthrough
  50. default:
  51. panic("Exited on request")
  52. case cmdCont:
  53. }
  54. }
  55. }
  56. args := os.Args[1:]
  57. env := os.Environ()
  58. if err := syscall.Exec(binary, args, env); err != nil {
  59. panic(err)
  60. }
  61. panic("Exec failed.")
  62. }
  63. func initCgroup(cfg *cgroupConfig) (error) {
  64. logger.Debugf("Initializing cgroup")
  65. baseGroup := cfg.Group
  66. //subsystem := cfg.Subsystem
  67. // If baseGroup is empty, it implies using the cgroup of the current process
  68. // otherwise, it refers to a absolute group path
  69. if baseGroup != "" {
  70. baseGroup = filepath.Join("/", baseGroup)
  71. }
  72. cfg.isUnified = cgv1.Mode() == cgv1.Unified
  73. if cfg.isUnified {
  74. logger.Debugf("Cgroup V2 detected")
  75. g := baseGroup
  76. if g == "" {
  77. logger.Debugf("Detecting my cgroup path")
  78. var err error
  79. if g, err = cgv2.NestedGroupPath(""); err != nil {
  80. return err
  81. }
  82. }
  83. logger.Infof("Using cgroup path: %s", g)
  84. var err error
  85. if cfg.cgMgrV2, err = cgv2.LoadManager("/sys/fs/cgroup", g); err != nil {
  86. return err
  87. }
  88. if baseGroup == "" {
  89. logger.Debugf("Creating a sub group and move all processes into it")
  90. wkrMgr, err := cfg.cgMgrV2.NewChild("__worker", nil);
  91. if err != nil {
  92. return err
  93. }
  94. for {
  95. logger.Debugf("Reading pids")
  96. procs, err := cfg.cgMgrV2.Procs(false)
  97. if err != nil {
  98. logger.Errorf("Cannot read pids in that group")
  99. return err
  100. }
  101. if len(procs) == 0 {
  102. break
  103. }
  104. for _, p := range(procs) {
  105. if err := wkrMgr.AddProc(p); err != nil{
  106. if errors.Is(err, syscall.ESRCH) {
  107. logger.Debugf("Write pid %d to sub group failed: process vanished, ignoring")
  108. } else {
  109. return err
  110. }
  111. }
  112. }
  113. }
  114. } else {
  115. logger.Debugf("Trying to create a sub group in that group")
  116. testMgr, err := cfg.cgMgrV2.NewChild("__test", nil);
  117. if err != nil {
  118. logger.Errorf("Cannot create a sub group in the cgroup")
  119. return err
  120. }
  121. if err := testMgr.Delete(); err != nil {
  122. return err
  123. }
  124. procs, err := cfg.cgMgrV2.Procs(false)
  125. if err != nil {
  126. logger.Errorf("Cannot read pids in that group")
  127. return err
  128. }
  129. if len(procs) != 0 {
  130. return fmt.Errorf("There are remaining processes in cgroup %s", baseGroup)
  131. }
  132. }
  133. } else {
  134. logger.Debugf("Cgroup V1 detected")
  135. var pather cgv1.Path
  136. if baseGroup != "" {
  137. pather = cgv1.StaticPath(baseGroup)
  138. } else {
  139. pather = (func(p cgv1.Path) (cgv1.Path){
  140. return func(subsys cgv1.Name) (string, error){
  141. path, err := p(subsys);
  142. if err != nil {
  143. return "", err
  144. }
  145. if path == "/" {
  146. return "", cgv1.ErrControllerNotActive
  147. }
  148. return path, err
  149. }
  150. })(cgv1.NestedPath(""))
  151. }
  152. logger.Infof("Loading cgroup")
  153. var err error
  154. if cfg.cgMgrV1, err = cgv1.Load(cgv1.V1, pather, func(cfg *cgv1.InitConfig) error{
  155. cfg.InitCheck = cgv1.AllowAny
  156. return nil
  157. }); err != nil {
  158. return err
  159. }
  160. logger.Debugf("Available subsystems:")
  161. for _, subsys := range(cfg.cgMgrV1.Subsystems()) {
  162. p, err := pather(subsys.Name())
  163. if err != nil {
  164. return err
  165. }
  166. logger.Debugf("%s: %s", subsys.Name(), p)
  167. }
  168. if baseGroup == "" {
  169. logger.Debugf("Creating a sub group and move all processes into it")
  170. wkrMgr, err := cfg.cgMgrV1.New("__worker", &contspecs.LinuxResources{});
  171. if err != nil {
  172. return err
  173. }
  174. for _, subsys := range(cfg.cgMgrV1.Subsystems()) {
  175. logger.Debugf("Reading pids for subsystem %s", subsys.Name())
  176. for {
  177. procs, err := cfg.cgMgrV1.Processes(subsys.Name(), false)
  178. if err != nil {
  179. p, err := pather(subsys.Name())
  180. if err != nil {
  181. return err
  182. }
  183. logger.Errorf("Cannot read pids in group %s of subsystem %s", p, subsys.Name())
  184. return err
  185. }
  186. if len(procs) == 0 {
  187. break
  188. }
  189. for _, proc := range(procs) {
  190. if err := wkrMgr.Add(proc); err != nil {
  191. if errors.Is(err, syscall.ESRCH) {
  192. logger.Debugf("Write pid %d to sub group failed: process vanished, ignoring")
  193. } else {
  194. return err
  195. }
  196. }
  197. }
  198. }
  199. }
  200. } else {
  201. logger.Debugf("Trying to create a sub group in that group")
  202. testMgr, err := cfg.cgMgrV1.New("__test", &contspecs.LinuxResources{});
  203. if err != nil {
  204. logger.Errorf("Cannot create a sub group in the cgroup")
  205. return err
  206. }
  207. if err := testMgr.Delete(); err != nil {
  208. return err
  209. }
  210. for _, subsys := range(cfg.cgMgrV1.Subsystems()) {
  211. logger.Debugf("Reading pids for subsystem %s", subsys.Name())
  212. procs, err := cfg.cgMgrV1.Processes(subsys.Name(), false)
  213. if err != nil {
  214. p, err := pather(subsys.Name())
  215. if err != nil {
  216. return err
  217. }
  218. logger.Errorf("Cannot read pids in group %s of subsystem %s", p, subsys.Name())
  219. return err
  220. }
  221. if len(procs) != 0 {
  222. p, err := pather(subsys.Name())
  223. if err != nil {
  224. return err
  225. }
  226. return fmt.Errorf("There are remaining processes in cgroup %s of subsystem %s", p, subsys.Name())
  227. }
  228. }
  229. }
  230. }
  231. return nil
  232. }
  233. func newCgroupHook(p mirrorProvider, cfg cgroupConfig, memLimit MemBytes) *cgroupHook {
  234. return &cgroupHook{
  235. emptyHook: emptyHook{
  236. provider: p,
  237. },
  238. cgCfg: cfg,
  239. memLimit: memLimit,
  240. }
  241. }
  242. func (c *cgroupHook) preExec() error {
  243. if c.cgCfg.isUnified {
  244. logger.Debugf("Creating v2 cgroup for task %s", c.provider.Name())
  245. var resSet *cgv2.Resources
  246. if c.memLimit != 0 {
  247. resSet = &cgv2.Resources {
  248. Memory: &cgv2.Memory{
  249. Max: func(i int64) *int64 { return &i }(c.memLimit.Value()),
  250. },
  251. }
  252. }
  253. subMgr, err := c.cgCfg.cgMgrV2.NewChild(c.provider.Name(), resSet)
  254. if err != nil {
  255. logger.Errorf("Failed to create cgroup for task %s: %s", c.provider.Name(), err.Error())
  256. return err
  257. }
  258. c.cgMgrV2 = subMgr
  259. } else {
  260. logger.Debugf("Creating v1 cgroup for task %s", c.provider.Name())
  261. var resSet contspecs.LinuxResources
  262. if c.memLimit != 0 {
  263. resSet = contspecs.LinuxResources {
  264. Memory: &contspecs.LinuxMemory{
  265. Limit: func(i int64) *int64 { return &i }(c.memLimit.Value()),
  266. },
  267. }
  268. }
  269. subMgr, err := c.cgCfg.cgMgrV1.New(c.provider.Name(), &resSet)
  270. if err != nil {
  271. logger.Errorf("Failed to create cgroup for task %s: %s", c.provider.Name(), err.Error())
  272. return err
  273. }
  274. c.cgMgrV1 = subMgr
  275. }
  276. return nil
  277. }
  278. func (c *cgroupHook) postExec() error {
  279. err := c.killAll()
  280. if err != nil {
  281. logger.Errorf("Error killing tasks: %s", err.Error())
  282. }
  283. if c.cgCfg.isUnified {
  284. logger.Debugf("Deleting v2 cgroup for task %s", c.provider.Name())
  285. if err := c.cgMgrV2.Delete(); err != nil {
  286. logger.Errorf("Failed to delete cgroup for task %s: %s", c.provider.Name(), err.Error())
  287. return err
  288. }
  289. c.cgMgrV2 = nil
  290. } else {
  291. logger.Debugf("Deleting v1 cgroup for task %s", c.provider.Name())
  292. if err := c.cgMgrV1.Delete(); err != nil {
  293. logger.Errorf("Failed to delete cgroup for task %s: %s", c.provider.Name(), err.Error())
  294. return err
  295. }
  296. c.cgMgrV1 = nil
  297. }
  298. return nil
  299. }
  300. func (c *cgroupHook) killAll() error {
  301. if c.cgCfg.isUnified {
  302. if c.cgMgrV2 == nil {
  303. return nil
  304. }
  305. } else {
  306. if c.cgMgrV1 == nil {
  307. return nil
  308. }
  309. }
  310. readTaskList := func() ([]int, error) {
  311. taskList := []int{}
  312. if c.cgCfg.isUnified {
  313. procs, err := c.cgMgrV2.Procs(false)
  314. if (err != nil) {
  315. return []int{}, err
  316. }
  317. for _, proc := range procs {
  318. taskList = append(taskList, int(proc))
  319. }
  320. } else {
  321. taskSet := make(map[int]struct{})
  322. for _, subsys := range(c.cgMgrV1.Subsystems()) {
  323. procs, err := c.cgMgrV1.Processes(subsys.Name(), false)
  324. if err != nil {
  325. return []int{}, err
  326. }
  327. for _, proc := range(procs) {
  328. taskSet[proc.Pid] = struct{}{}
  329. }
  330. }
  331. for proc := range(taskSet) {
  332. taskList = append(taskList, proc)
  333. }
  334. }
  335. return taskList, nil
  336. }
  337. for i := 0; i < 4; i++ {
  338. if i == 3 {
  339. return errors.New("Unable to kill all child tasks")
  340. }
  341. taskList, err := readTaskList()
  342. if err != nil {
  343. return err
  344. }
  345. if len(taskList) == 0 {
  346. return nil
  347. }
  348. for _, pid := range taskList {
  349. // TODO: deal with defunct processes
  350. logger.Debugf("Killing process: %d", pid)
  351. unix.Kill(pid, syscall.SIGKILL)
  352. }
  353. // sleep 10ms for the first round, and 1.01s, 2.01s, 3.01s for the rest
  354. time.Sleep(time.Duration(i)*time.Second + 10*time.Millisecond)
  355. }
  356. return nil
  357. }