
This changes the shim's OOM score from a static max killable of -999 to be +1 of the containerd daemon's score. This should allow the shim's to be killed first in an OOM condition but leave the daemon alone for a bit to help cleanup and manage the containers during this situation. Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
92 lines
2.5 KiB
Go
92 lines
2.5 KiB
Go
// +build !windows
|
|
|
|
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package shim
|
|
|
|
import (
|
|
"context"
|
|
"crypto/sha256"
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/containerd/containerd/namespaces"
|
|
"github.com/containerd/containerd/sys"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
const shimBinaryFormat = "containerd-shim-%s-%s"
|
|
|
|
func getSysProcAttr() *syscall.SysProcAttr {
|
|
return &syscall.SysProcAttr{
|
|
Setpgid: true,
|
|
}
|
|
}
|
|
|
|
// SetScore sets the oom score for a process
|
|
func SetScore(pid int) error {
|
|
return sys.SetOOMScore(pid, sys.OOMScoreMaxKillable)
|
|
}
|
|
|
|
// AdjustOOMScore sets the OOM score for the process to the parents OOM score +1
|
|
// to ensure that they parent has a lower* score than the shim
|
|
func AdjustOOMScore(pid int) error {
|
|
parent := os.Getppid()
|
|
score, err := sys.GetOOMScoreAdj(parent)
|
|
if err != nil {
|
|
return errors.Wrap(err, "get parent OOM score")
|
|
}
|
|
shimScore := score + 1
|
|
if err := sys.SetOOMScore(pid, shimScore); err != nil {
|
|
return errors.Wrap(err, "set shim OOM score")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// SocketAddress returns an abstract socket address
|
|
func SocketAddress(ctx context.Context, id string) (string, error) {
|
|
ns, err := namespaces.NamespaceRequired(ctx)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
d := sha256.Sum256([]byte(filepath.Join(ns, id)))
|
|
return filepath.Join(string(filepath.Separator), "containerd-shim", fmt.Sprintf("%x.sock", d)), nil
|
|
}
|
|
|
|
// AnonDialer returns a dialer for an abstract socket
|
|
func AnonDialer(address string, timeout time.Duration) (net.Conn, error) {
|
|
address = strings.TrimPrefix(address, "unix://")
|
|
return net.DialTimeout("unix", "\x00"+address, timeout)
|
|
}
|
|
|
|
// NewSocket returns a new socket
|
|
func NewSocket(address string) (*net.UnixListener, error) {
|
|
if len(address) > 106 {
|
|
return nil, errors.Errorf("%q: unix socket path too long (> 106)", address)
|
|
}
|
|
l, err := net.Listen("unix", "\x00"+address)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "failed to listen to abstract unix socket %q", address)
|
|
}
|
|
return l.(*net.UnixListener), nil
|
|
}
|