1 | /* |
2 | * Copyright (c) 2017, 2019, Oracle and/or its affiliates. All rights reserved. |
3 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
4 | * |
5 | * This code is free software; you can redistribute it and/or modify it |
6 | * under the terms of the GNU General Public License version 2 only, as |
7 | * published by the Free Software Foundation. |
8 | * |
9 | * This code is distributed in the hope that it will be useful, but WITHOUT |
10 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
11 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
12 | * version 2 for more details (a copy is included in the LICENSE file that |
13 | * accompanied this code). |
14 | * |
15 | * You should have received a copy of the GNU General Public License version |
16 | * 2 along with this work; if not, write to the Free Software Foundation, |
17 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
18 | * |
19 | * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
20 | * or visit www.oracle.com if you need additional information or have any |
21 | * questions. |
22 | * |
23 | */ |
24 | |
25 | #include <string.h> |
26 | #include <math.h> |
27 | #include <errno.h> |
28 | #include "utilities/globalDefinitions.hpp" |
29 | #include "memory/allocation.hpp" |
30 | #include "runtime/os.hpp" |
31 | #include "logging/log.hpp" |
32 | #include "osContainer_linux.hpp" |
33 | |
34 | /* |
35 | * PER_CPU_SHARES has been set to 1024 because CPU shares' quota |
36 | * is commonly used in cloud frameworks like Kubernetes[1], |
37 | * AWS[2] and Mesos[3] in a similar way. They spawn containers with |
38 | * --cpu-shares option values scaled by PER_CPU_SHARES. Thus, we do |
39 | * the inverse for determining the number of possible available |
40 | * CPUs to the JVM inside a container. See JDK-8216366. |
41 | * |
42 | * [1] https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#meaning-of-cpu |
43 | * In particular: |
44 | * When using Docker: |
45 | * The spec.containers[].resources.requests.cpu is converted to its core value, which is potentially |
46 | * fractional, and multiplied by 1024. The greater of this number or 2 is used as the value of the |
47 | * --cpu-shares flag in the docker run command. |
48 | * [2] https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_ContainerDefinition.html |
49 | * [3] https://github.com/apache/mesos/blob/3478e344fb77d931f6122980c6e94cd3913c441d/src/docker/docker.cpp#L648 |
50 | * https://github.com/apache/mesos/blob/3478e344fb77d931f6122980c6e94cd3913c441d/src/slave/containerizer/mesos/isolators/cgroups/constants.hpp#L30 |
51 | */ |
52 | #define PER_CPU_SHARES 1024 |
53 | |
54 | bool OSContainer::_is_initialized = false; |
55 | bool OSContainer::_is_containerized = false; |
56 | julong _unlimited_memory; |
57 | |
58 | class CgroupSubsystem: CHeapObj<mtInternal> { |
59 | friend class OSContainer; |
60 | |
61 | private: |
62 | /* mountinfo contents */ |
63 | char *_root; |
64 | char *_mount_point; |
65 | |
66 | /* Constructed subsystem directory */ |
67 | char *_path; |
68 | |
69 | public: |
70 | CgroupSubsystem(char *root, char *mountpoint) { |
71 | _root = os::strdup(root); |
72 | _mount_point = os::strdup(mountpoint); |
73 | _path = NULL; |
74 | } |
75 | |
76 | /* |
77 | * Set directory to subsystem specific files based |
78 | * on the contents of the mountinfo and cgroup files. |
79 | */ |
80 | void set_subsystem_path(char *cgroup_path) { |
81 | char buf[MAXPATHLEN+1]; |
82 | if (_root != NULL && cgroup_path != NULL) { |
83 | if (strcmp(_root, "/" ) == 0) { |
84 | int buflen; |
85 | strncpy(buf, _mount_point, MAXPATHLEN); |
86 | buf[MAXPATHLEN-1] = '\0'; |
87 | if (strcmp(cgroup_path,"/" ) != 0) { |
88 | buflen = strlen(buf); |
89 | if ((buflen + strlen(cgroup_path)) > (MAXPATHLEN-1)) { |
90 | return; |
91 | } |
92 | strncat(buf, cgroup_path, MAXPATHLEN-buflen); |
93 | buf[MAXPATHLEN-1] = '\0'; |
94 | } |
95 | _path = os::strdup(buf); |
96 | } else { |
97 | if (strcmp(_root, cgroup_path) == 0) { |
98 | strncpy(buf, _mount_point, MAXPATHLEN); |
99 | buf[MAXPATHLEN-1] = '\0'; |
100 | _path = os::strdup(buf); |
101 | } else { |
102 | char *p = strstr(cgroup_path, _root); |
103 | if (p != NULL && p == _root) { |
104 | if (strlen(cgroup_path) > strlen(_root)) { |
105 | int buflen; |
106 | strncpy(buf, _mount_point, MAXPATHLEN); |
107 | buf[MAXPATHLEN-1] = '\0'; |
108 | buflen = strlen(buf); |
109 | if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) { |
110 | return; |
111 | } |
112 | strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen); |
113 | buf[MAXPATHLEN-1] = '\0'; |
114 | _path = os::strdup(buf); |
115 | } |
116 | } |
117 | } |
118 | } |
119 | } |
120 | } |
121 | |
122 | char *subsystem_path() { return _path; } |
123 | }; |
124 | |
125 | class CgroupMemorySubsystem: CgroupSubsystem { |
126 | friend class OSContainer; |
127 | |
128 | private: |
129 | /* Some container runtimes set limits via cgroup |
130 | * hierarchy. If set to true consider also memory.stat |
131 | * file if everything else seems unlimited */ |
132 | bool _uses_mem_hierarchy; |
133 | |
134 | public: |
135 | CgroupMemorySubsystem(char *root, char *mountpoint) : CgroupSubsystem::CgroupSubsystem(root, mountpoint) { |
136 | _uses_mem_hierarchy = false; |
137 | } |
138 | |
139 | bool is_hierarchical() { return _uses_mem_hierarchy; } |
140 | void set_hierarchical(bool value) { _uses_mem_hierarchy = value; } |
141 | }; |
142 | |
143 | CgroupMemorySubsystem* memory = NULL; |
144 | CgroupSubsystem* cpuset = NULL; |
145 | CgroupSubsystem* cpu = NULL; |
146 | CgroupSubsystem* cpuacct = NULL; |
147 | |
148 | typedef char * cptr; |
149 | |
150 | PRAGMA_DIAG_PUSH |
151 | PRAGMA_FORMAT_NONLITERAL_IGNORED |
152 | template <typename T> int subsystem_file_line_contents(CgroupSubsystem* c, |
153 | const char *filename, |
154 | const char *matchline, |
155 | const char *scan_fmt, |
156 | T returnval) { |
157 | FILE *fp = NULL; |
158 | char *p; |
159 | char file[MAXPATHLEN+1]; |
160 | char buf[MAXPATHLEN+1]; |
161 | char discard[MAXPATHLEN+1]; |
162 | bool found_match = false; |
163 | |
164 | if (c == NULL) { |
165 | log_debug(os, container)("subsystem_file_line_contents: CgroupSubsytem* is NULL" ); |
166 | return OSCONTAINER_ERROR; |
167 | } |
168 | if (c->subsystem_path() == NULL) { |
169 | log_debug(os, container)("subsystem_file_line_contents: subsystem path is NULL" ); |
170 | return OSCONTAINER_ERROR; |
171 | } |
172 | |
173 | strncpy(file, c->subsystem_path(), MAXPATHLEN); |
174 | file[MAXPATHLEN-1] = '\0'; |
175 | int filelen = strlen(file); |
176 | if ((filelen + strlen(filename)) > (MAXPATHLEN-1)) { |
177 | log_debug(os, container)("File path too long %s, %s" , file, filename); |
178 | return OSCONTAINER_ERROR; |
179 | } |
180 | strncat(file, filename, MAXPATHLEN-filelen); |
181 | log_trace(os, container)("Path to %s is %s" , filename, file); |
182 | fp = fopen(file, "r" ); |
183 | if (fp != NULL) { |
184 | int err = 0; |
185 | while ((p = fgets(buf, MAXPATHLEN, fp)) != NULL) { |
186 | found_match = false; |
187 | if (matchline == NULL) { |
188 | // single-line file case |
189 | int matched = sscanf(p, scan_fmt, returnval); |
190 | found_match = (matched == 1); |
191 | } else { |
192 | // multi-line file case |
193 | if (strstr(p, matchline) != NULL) { |
194 | // discard matchline string prefix |
195 | int matched = sscanf(p, scan_fmt, discard, returnval); |
196 | found_match = (matched == 2); |
197 | } else { |
198 | continue; // substring not found |
199 | } |
200 | } |
201 | if (found_match) { |
202 | fclose(fp); |
203 | return 0; |
204 | } else { |
205 | err = 1; |
206 | log_debug(os, container)("Type %s not found in file %s" , scan_fmt, file); |
207 | } |
208 | } |
209 | if (err == 0) { |
210 | log_debug(os, container)("Empty file %s" , file); |
211 | } |
212 | } else { |
213 | log_debug(os, container)("Open of file %s failed, %s" , file, os::strerror(errno)); |
214 | } |
215 | if (fp != NULL) |
216 | fclose(fp); |
217 | return OSCONTAINER_ERROR; |
218 | } |
219 | PRAGMA_DIAG_POP |
220 | |
221 | #define GET_CONTAINER_INFO(return_type, subsystem, filename, \ |
222 | logstring, scan_fmt, variable) \ |
223 | return_type variable; \ |
224 | { \ |
225 | int err; \ |
226 | err = subsystem_file_line_contents(subsystem, \ |
227 | filename, \ |
228 | NULL, \ |
229 | scan_fmt, \ |
230 | &variable); \ |
231 | if (err != 0) \ |
232 | return (return_type) OSCONTAINER_ERROR; \ |
233 | \ |
234 | log_trace(os, container)(logstring, variable); \ |
235 | } |
236 | |
237 | #define GET_CONTAINER_INFO_CPTR(return_type, subsystem, filename, \ |
238 | logstring, scan_fmt, variable, bufsize) \ |
239 | char variable[bufsize]; \ |
240 | { \ |
241 | int err; \ |
242 | err = subsystem_file_line_contents(subsystem, \ |
243 | filename, \ |
244 | NULL, \ |
245 | scan_fmt, \ |
246 | variable); \ |
247 | if (err != 0) \ |
248 | return (return_type) NULL; \ |
249 | \ |
250 | log_trace(os, container)(logstring, variable); \ |
251 | } |
252 | |
253 | #define GET_CONTAINER_INFO_LINE(return_type, subsystem, filename, \ |
254 | matchline, logstring, scan_fmt, variable) \ |
255 | return_type variable; \ |
256 | { \ |
257 | int err; \ |
258 | err = subsystem_file_line_contents(subsystem, \ |
259 | filename, \ |
260 | matchline, \ |
261 | scan_fmt, \ |
262 | &variable); \ |
263 | if (err != 0) \ |
264 | return (return_type) OSCONTAINER_ERROR; \ |
265 | \ |
266 | log_trace(os, container)(logstring, variable); \ |
267 | } |
268 | |
269 | /* init |
270 | * |
271 | * Initialize the container support and determine if |
272 | * we are running under cgroup control. |
273 | */ |
274 | void OSContainer::init() { |
275 | FILE *mntinfo = NULL; |
276 | FILE *cgroup = NULL; |
277 | char buf[MAXPATHLEN+1]; |
278 | char tmproot[MAXPATHLEN+1]; |
279 | char tmpmount[MAXPATHLEN+1]; |
280 | char *p; |
281 | jlong mem_limit; |
282 | |
283 | assert(!_is_initialized, "Initializing OSContainer more than once" ); |
284 | |
285 | _is_initialized = true; |
286 | _is_containerized = false; |
287 | |
288 | _unlimited_memory = (LONG_MAX / os::vm_page_size()) * os::vm_page_size(); |
289 | |
290 | log_trace(os, container)("OSContainer::init: Initializing Container Support" ); |
291 | if (!UseContainerSupport) { |
292 | log_trace(os, container)("Container Support not enabled" ); |
293 | return; |
294 | } |
295 | |
296 | /* |
297 | * Find the cgroup mount point for memory and cpuset |
298 | * by reading /proc/self/mountinfo |
299 | * |
300 | * Example for docker: |
301 | * 219 214 0:29 /docker/7208cebd00fa5f2e342b1094f7bed87fa25661471a4637118e65f1c995be8a34 /sys/fs/cgroup/memory ro,nosuid,nodev,noexec,relatime - cgroup cgroup rw,memory |
302 | * |
303 | * Example for host: |
304 | * 34 28 0:29 / /sys/fs/cgroup/memory rw,nosuid,nodev,noexec,relatime shared:16 - cgroup cgroup rw,memory |
305 | */ |
306 | mntinfo = fopen("/proc/self/mountinfo" , "r" ); |
307 | if (mntinfo == NULL) { |
308 | log_debug(os, container)("Can't open /proc/self/mountinfo, %s" , |
309 | os::strerror(errno)); |
310 | return; |
311 | } |
312 | |
313 | while ((p = fgets(buf, MAXPATHLEN, mntinfo)) != NULL) { |
314 | char tmpcgroups[MAXPATHLEN+1]; |
315 | char *cptr = tmpcgroups; |
316 | char *token; |
317 | |
318 | // mountinfo format is documented at https://www.kernel.org/doc/Documentation/filesystems/proc.txt |
319 | if (sscanf(p, "%*d %*d %*d:%*d %s %s %*[^-]- cgroup %*s %s" , tmproot, tmpmount, tmpcgroups) != 3) { |
320 | continue; |
321 | } |
322 | while ((token = strsep(&cptr, "," )) != NULL) { |
323 | if (strcmp(token, "memory" ) == 0) { |
324 | memory = new CgroupMemorySubsystem(tmproot, tmpmount); |
325 | } else if (strcmp(token, "cpuset" ) == 0) { |
326 | cpuset = new CgroupSubsystem(tmproot, tmpmount); |
327 | } else if (strcmp(token, "cpu" ) == 0) { |
328 | cpu = new CgroupSubsystem(tmproot, tmpmount); |
329 | } else if (strcmp(token, "cpuacct" ) == 0) { |
330 | cpuacct= new CgroupSubsystem(tmproot, tmpmount); |
331 | } |
332 | } |
333 | } |
334 | |
335 | fclose(mntinfo); |
336 | |
337 | if (memory == NULL) { |
338 | log_debug(os, container)("Required cgroup memory subsystem not found" ); |
339 | return; |
340 | } |
341 | if (cpuset == NULL) { |
342 | log_debug(os, container)("Required cgroup cpuset subsystem not found" ); |
343 | return; |
344 | } |
345 | if (cpu == NULL) { |
346 | log_debug(os, container)("Required cgroup cpu subsystem not found" ); |
347 | return; |
348 | } |
349 | if (cpuacct == NULL) { |
350 | log_debug(os, container)("Required cgroup cpuacct subsystem not found" ); |
351 | return; |
352 | } |
353 | |
354 | /* |
355 | * Read /proc/self/cgroup and map host mount point to |
356 | * local one via /proc/self/mountinfo content above |
357 | * |
358 | * Docker example: |
359 | * 5:memory:/docker/6558aed8fc662b194323ceab5b964f69cf36b3e8af877a14b80256e93aecb044 |
360 | * |
361 | * Host example: |
362 | * 5:memory:/user.slice |
363 | * |
364 | * Construct a path to the process specific memory and cpuset |
365 | * cgroup directory. |
366 | * |
367 | * For a container running under Docker from memory example above |
368 | * the paths would be: |
369 | * |
370 | * /sys/fs/cgroup/memory |
371 | * |
372 | * For a Host from memory example above the path would be: |
373 | * |
374 | * /sys/fs/cgroup/memory/user.slice |
375 | * |
376 | */ |
377 | cgroup = fopen("/proc/self/cgroup" , "r" ); |
378 | if (cgroup == NULL) { |
379 | log_debug(os, container)("Can't open /proc/self/cgroup, %s" , |
380 | os::strerror(errno)); |
381 | return; |
382 | } |
383 | |
384 | while ((p = fgets(buf, MAXPATHLEN, cgroup)) != NULL) { |
385 | char *controllers; |
386 | char *token; |
387 | char *base; |
388 | |
389 | /* Skip cgroup number */ |
390 | strsep(&p, ":" ); |
391 | /* Get controllers and base */ |
392 | controllers = strsep(&p, ":" ); |
393 | base = strsep(&p, "\n" ); |
394 | |
395 | if (controllers == NULL) { |
396 | continue; |
397 | } |
398 | |
399 | while ((token = strsep(&controllers, "," )) != NULL) { |
400 | if (strcmp(token, "memory" ) == 0) { |
401 | memory->set_subsystem_path(base); |
402 | jlong hierarchy = uses_mem_hierarchy(); |
403 | if (hierarchy > 0) { |
404 | memory->set_hierarchical(true); |
405 | } |
406 | } else if (strcmp(token, "cpuset" ) == 0) { |
407 | cpuset->set_subsystem_path(base); |
408 | } else if (strcmp(token, "cpu" ) == 0) { |
409 | cpu->set_subsystem_path(base); |
410 | } else if (strcmp(token, "cpuacct" ) == 0) { |
411 | cpuacct->set_subsystem_path(base); |
412 | } |
413 | } |
414 | } |
415 | |
416 | fclose(cgroup); |
417 | |
418 | // We need to update the amount of physical memory now that |
419 | // command line arguments have been processed. |
420 | if ((mem_limit = memory_limit_in_bytes()) > 0) { |
421 | os::Linux::set_physical_memory(mem_limit); |
422 | log_info(os, container)("Memory Limit is: " JLONG_FORMAT, mem_limit); |
423 | } |
424 | |
425 | _is_containerized = true; |
426 | |
427 | } |
428 | |
429 | const char * OSContainer::container_type() { |
430 | if (is_containerized()) { |
431 | return "cgroupv1" ; |
432 | } else { |
433 | return NULL; |
434 | } |
435 | } |
436 | |
437 | /* uses_mem_hierarchy |
438 | * |
439 | * Return whether or not hierarchical cgroup accounting is being |
440 | * done. |
441 | * |
442 | * return: |
443 | * A number > 0 if true, or |
444 | * OSCONTAINER_ERROR for not supported |
445 | */ |
446 | jlong OSContainer::uses_mem_hierarchy() { |
447 | GET_CONTAINER_INFO(jlong, memory, "/memory.use_hierarchy" , |
448 | "Use Hierarchy is: " JLONG_FORMAT, JLONG_FORMAT, use_hierarchy); |
449 | return use_hierarchy; |
450 | } |
451 | |
452 | |
453 | /* memory_limit_in_bytes |
454 | * |
455 | * Return the limit of available memory for this process. |
456 | * |
457 | * return: |
458 | * memory limit in bytes or |
459 | * -1 for unlimited |
460 | * OSCONTAINER_ERROR for not supported |
461 | */ |
462 | jlong OSContainer::memory_limit_in_bytes() { |
463 | GET_CONTAINER_INFO(julong, memory, "/memory.limit_in_bytes" , |
464 | "Memory Limit is: " JULONG_FORMAT, JULONG_FORMAT, memlimit); |
465 | |
466 | if (memlimit >= _unlimited_memory) { |
467 | log_trace(os, container)("Non-Hierarchical Memory Limit is: Unlimited" ); |
468 | if (memory->is_hierarchical()) { |
469 | const char* matchline = "hierarchical_memory_limit" ; |
470 | const char* format = "%s " JULONG_FORMAT; |
471 | GET_CONTAINER_INFO_LINE(julong, memory, "/memory.stat" , matchline, |
472 | "Hierarchical Memory Limit is: " JULONG_FORMAT, format, hier_memlimit) |
473 | if (hier_memlimit >= _unlimited_memory) { |
474 | log_trace(os, container)("Hierarchical Memory Limit is: Unlimited" ); |
475 | } else { |
476 | return (jlong)hier_memlimit; |
477 | } |
478 | } |
479 | return (jlong)-1; |
480 | } |
481 | else { |
482 | return (jlong)memlimit; |
483 | } |
484 | } |
485 | |
486 | jlong OSContainer::memory_and_swap_limit_in_bytes() { |
487 | GET_CONTAINER_INFO(julong, memory, "/memory.memsw.limit_in_bytes" , |
488 | "Memory and Swap Limit is: " JULONG_FORMAT, JULONG_FORMAT, memswlimit); |
489 | if (memswlimit >= _unlimited_memory) { |
490 | log_trace(os, container)("Non-Hierarchical Memory and Swap Limit is: Unlimited" ); |
491 | if (memory->is_hierarchical()) { |
492 | const char* matchline = "hierarchical_memsw_limit" ; |
493 | const char* format = "%s " JULONG_FORMAT; |
494 | GET_CONTAINER_INFO_LINE(julong, memory, "/memory.stat" , matchline, |
495 | "Hierarchical Memory and Swap Limit is : " JULONG_FORMAT, format, hier_memlimit) |
496 | if (hier_memlimit >= _unlimited_memory) { |
497 | log_trace(os, container)("Hierarchical Memory and Swap Limit is: Unlimited" ); |
498 | } else { |
499 | return (jlong)hier_memlimit; |
500 | } |
501 | } |
502 | return (jlong)-1; |
503 | } else { |
504 | return (jlong)memswlimit; |
505 | } |
506 | } |
507 | |
508 | jlong OSContainer::memory_soft_limit_in_bytes() { |
509 | GET_CONTAINER_INFO(julong, memory, "/memory.soft_limit_in_bytes" , |
510 | "Memory Soft Limit is: " JULONG_FORMAT, JULONG_FORMAT, memsoftlimit); |
511 | if (memsoftlimit >= _unlimited_memory) { |
512 | log_trace(os, container)("Memory Soft Limit is: Unlimited" ); |
513 | return (jlong)-1; |
514 | } else { |
515 | return (jlong)memsoftlimit; |
516 | } |
517 | } |
518 | |
519 | /* memory_usage_in_bytes |
520 | * |
521 | * Return the amount of used memory for this process. |
522 | * |
523 | * return: |
524 | * memory usage in bytes or |
525 | * -1 for unlimited |
526 | * OSCONTAINER_ERROR for not supported |
527 | */ |
528 | jlong OSContainer::memory_usage_in_bytes() { |
529 | GET_CONTAINER_INFO(jlong, memory, "/memory.usage_in_bytes" , |
530 | "Memory Usage is: " JLONG_FORMAT, JLONG_FORMAT, memusage); |
531 | return memusage; |
532 | } |
533 | |
534 | /* memory_max_usage_in_bytes |
535 | * |
536 | * Return the maximum amount of used memory for this process. |
537 | * |
538 | * return: |
539 | * max memory usage in bytes or |
540 | * OSCONTAINER_ERROR for not supported |
541 | */ |
542 | jlong OSContainer::memory_max_usage_in_bytes() { |
543 | GET_CONTAINER_INFO(jlong, memory, "/memory.max_usage_in_bytes" , |
544 | "Maximum Memory Usage is: " JLONG_FORMAT, JLONG_FORMAT, memmaxusage); |
545 | return memmaxusage; |
546 | } |
547 | |
548 | /* active_processor_count |
549 | * |
550 | * Calculate an appropriate number of active processors for the |
551 | * VM to use based on these three inputs. |
552 | * |
553 | * cpu affinity |
554 | * cgroup cpu quota & cpu period |
555 | * cgroup cpu shares |
556 | * |
557 | * Algorithm: |
558 | * |
559 | * Determine the number of available CPUs from sched_getaffinity |
560 | * |
561 | * If user specified a quota (quota != -1), calculate the number of |
562 | * required CPUs by dividing quota by period. |
563 | * |
564 | * If shares are in effect (shares != -1), calculate the number |
565 | * of CPUs required for the shares by dividing the share value |
566 | * by PER_CPU_SHARES. |
567 | * |
568 | * All results of division are rounded up to the next whole number. |
569 | * |
570 | * If neither shares or quotas have been specified, return the |
571 | * number of active processors in the system. |
572 | * |
573 | * If both shares and quotas have been specified, the results are |
574 | * based on the flag PreferContainerQuotaForCPUCount. If true, |
575 | * return the quota value. If false return the smallest value |
576 | * between shares or quotas. |
577 | * |
578 | * If shares and/or quotas have been specified, the resulting number |
579 | * returned will never exceed the number of active processors. |
580 | * |
581 | * return: |
582 | * number of CPUs |
583 | */ |
584 | int OSContainer::active_processor_count() { |
585 | int quota_count = 0, share_count = 0; |
586 | int cpu_count, limit_count; |
587 | int result; |
588 | |
589 | cpu_count = limit_count = os::Linux::active_processor_count(); |
590 | int quota = cpu_quota(); |
591 | int period = cpu_period(); |
592 | int share = cpu_shares(); |
593 | |
594 | if (quota > -1 && period > 0) { |
595 | quota_count = ceilf((float)quota / (float)period); |
596 | log_trace(os, container)("CPU Quota count based on quota/period: %d" , quota_count); |
597 | } |
598 | if (share > -1) { |
599 | share_count = ceilf((float)share / (float)PER_CPU_SHARES); |
600 | log_trace(os, container)("CPU Share count based on shares: %d" , share_count); |
601 | } |
602 | |
603 | // If both shares and quotas are setup results depend |
604 | // on flag PreferContainerQuotaForCPUCount. |
605 | // If true, limit CPU count to quota |
606 | // If false, use minimum of shares and quotas |
607 | if (quota_count !=0 && share_count != 0) { |
608 | if (PreferContainerQuotaForCPUCount) { |
609 | limit_count = quota_count; |
610 | } else { |
611 | limit_count = MIN2(quota_count, share_count); |
612 | } |
613 | } else if (quota_count != 0) { |
614 | limit_count = quota_count; |
615 | } else if (share_count != 0) { |
616 | limit_count = share_count; |
617 | } |
618 | |
619 | result = MIN2(cpu_count, limit_count); |
620 | log_trace(os, container)("OSContainer::active_processor_count: %d" , result); |
621 | return result; |
622 | } |
623 | |
624 | char * OSContainer::cpu_cpuset_cpus() { |
625 | GET_CONTAINER_INFO_CPTR(cptr, cpuset, "/cpuset.cpus" , |
626 | "cpuset.cpus is: %s" , "%1023s" , cpus, 1024); |
627 | return os::strdup(cpus); |
628 | } |
629 | |
630 | char * OSContainer::cpu_cpuset_memory_nodes() { |
631 | GET_CONTAINER_INFO_CPTR(cptr, cpuset, "/cpuset.mems" , |
632 | "cpuset.mems is: %s" , "%1023s" , mems, 1024); |
633 | return os::strdup(mems); |
634 | } |
635 | |
636 | /* cpu_quota |
637 | * |
638 | * Return the number of milliseconds per period |
639 | * process is guaranteed to run. |
640 | * |
641 | * return: |
642 | * quota time in milliseconds |
643 | * -1 for no quota |
644 | * OSCONTAINER_ERROR for not supported |
645 | */ |
646 | int OSContainer::cpu_quota() { |
647 | GET_CONTAINER_INFO(int, cpu, "/cpu.cfs_quota_us" , |
648 | "CPU Quota is: %d" , "%d" , quota); |
649 | return quota; |
650 | } |
651 | |
652 | int OSContainer::cpu_period() { |
653 | GET_CONTAINER_INFO(int, cpu, "/cpu.cfs_period_us" , |
654 | "CPU Period is: %d" , "%d" , period); |
655 | return period; |
656 | } |
657 | |
658 | /* cpu_shares |
659 | * |
660 | * Return the amount of cpu shares available to the process |
661 | * |
662 | * return: |
663 | * Share number (typically a number relative to 1024) |
664 | * (2048 typically expresses 2 CPUs worth of processing) |
665 | * -1 for no share setup |
666 | * OSCONTAINER_ERROR for not supported |
667 | */ |
668 | int OSContainer::cpu_shares() { |
669 | GET_CONTAINER_INFO(int, cpu, "/cpu.shares" , |
670 | "CPU Shares is: %d" , "%d" , shares); |
671 | // Convert 1024 to no shares setup |
672 | if (shares == 1024) return -1; |
673 | |
674 | return shares; |
675 | } |
676 | |
677 | |