 775facd573
			
		
	
	775facd573
	
	
	
		
			
			TestUpdateContainerResources_MemoryLimit still uses old method to check memlimit in cgroup. Signed-off-by: Shengjing Zhu <zhsj@debian.org>
		
			
				
	
	
		
			281 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			281 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build linux
 | |
| // +build linux
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/containerd/cgroups"
 | |
| 	cgroupsv2 "github.com/containerd/cgroups/v2"
 | |
| 	"github.com/containerd/containerd"
 | |
| 	runtimespec "github.com/opencontainers/runtime-spec/specs-go"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
 | |
| )
 | |
| 
 | |
| func checkMemoryLimit(t *testing.T, spec *runtimespec.Spec, memLimit int64) {
 | |
| 	require.NotNil(t, spec)
 | |
| 	require.NotNil(t, spec.Linux)
 | |
| 	require.NotNil(t, spec.Linux.Resources)
 | |
| 	require.NotNil(t, spec.Linux.Resources.Memory)
 | |
| 	require.NotNil(t, spec.Linux.Resources.Memory.Limit)
 | |
| 	assert.Equal(t, memLimit, *spec.Linux.Resources.Memory.Limit)
 | |
| }
 | |
| 
 | |
| func checkMemorySwapLimit(t *testing.T, spec *runtimespec.Spec, memLimit *int64) {
 | |
| 	require.NotNil(t, spec)
 | |
| 	require.NotNil(t, spec.Linux)
 | |
| 	require.NotNil(t, spec.Linux.Resources)
 | |
| 	require.NotNil(t, spec.Linux.Resources.Memory)
 | |
| 	if memLimit == nil {
 | |
| 		require.Nil(t, spec.Linux.Resources.Memory.Swap)
 | |
| 	} else {
 | |
| 		require.NotNil(t, spec.Linux.Resources.Memory.Swap)
 | |
| 		assert.Equal(t, *memLimit, *spec.Linux.Resources.Memory.Swap)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func getCgroupSwapLimitForTask(t *testing.T, task containerd.Task) uint64 {
 | |
| 	if cgroups.Mode() == cgroups.Unified {
 | |
| 		groupPath, err := cgroupsv2.PidGroupPath(int(task.Pid()))
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		cgroup2, err := cgroupsv2.LoadManager("/sys/fs/cgroup", groupPath)
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		stat, err := cgroup2.Stat()
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		return stat.Memory.SwapLimit
 | |
| 	}
 | |
| 	cgroup, err := cgroups.Load(cgroups.V1, cgroups.PidPath(int(task.Pid())))
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	stat, err := cgroup.Stat(cgroups.IgnoreNotExist)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	return stat.Memory.HierarchicalSwapLimit
 | |
| }
 | |
| 
 | |
| func getCgroupMemoryLimitForTask(t *testing.T, task containerd.Task) uint64 {
 | |
| 	if cgroups.Mode() == cgroups.Unified {
 | |
| 		groupPath, err := cgroupsv2.PidGroupPath(int(task.Pid()))
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		cgroup2, err := cgroupsv2.LoadManager("/sys/fs/cgroup", groupPath)
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		stat, err := cgroup2.Stat()
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 		return stat.Memory.UsageLimit
 | |
| 	}
 | |
| 
 | |
| 	cgroup, err := cgroups.Load(cgroups.V1, cgroups.PidPath(int(task.Pid())))
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	stat, err := cgroup.Stat(cgroups.IgnoreNotExist)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	return stat.Memory.Usage.Limit
 | |
| }
 | |
| 
 | |
| func isSwapLikelyEnabled() bool {
 | |
| 	// Check whether swap is enabled.
 | |
| 	swapFile := "/proc/swaps"
 | |
| 	swapData, err := os.ReadFile(swapFile)
 | |
| 	if err != nil {
 | |
| 		// We can't read the file or it doesn't exist, assume we don't have swap.
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	swapData = bytes.TrimSpace(swapData) // extra trailing \n
 | |
| 	swapLines := strings.Split(string(swapData), "\n")
 | |
| 
 | |
| 	// If there is more than one line (table headers) in /proc/swaps, swap is enabled
 | |
| 	if len(swapLines) <= 1 {
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	// Linux Kernel's prior to 5.8 can disable swap accounting and is disabled
 | |
| 	// by default on Ubuntu. Most systems that run with cgroupsv2 enabled likely
 | |
| 	// have swap accounting enabled, here we assume that is true when running with
 | |
| 	// cgroupsv2 and check on cgroupsv1.
 | |
| 	if cgroups.Mode() == cgroups.Unified {
 | |
| 		return true
 | |
| 	}
 | |
| 
 | |
| 	_, err = os.Stat("/sys/fs/cgroup/memory/memory.memsw.limit_in_bytes")
 | |
| 	// Assume any error means this test can't run for now.
 | |
| 	return err == nil
 | |
| }
 | |
| 
 | |
| func TestUpdateContainerResources_MemorySwap(t *testing.T) {
 | |
| 	if !isSwapLikelyEnabled() {
 | |
| 		t.Skipf("Swap or swap accounting are not enabled. Swap is required for this test")
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	t.Log("Create a sandbox")
 | |
| 	sb, sbConfig := PodSandboxConfigWithCleanup(t, "sandbox", "update-container-swap-resources")
 | |
| 
 | |
| 	EnsureImageExists(t, pauseImage)
 | |
| 
 | |
| 	memoryLimit := int64(128 * 1024 * 1024)
 | |
| 	baseSwapLimit := int64(200 * 1024 * 1024)
 | |
| 	increasedSwapLimit := int64(256 * 1024 * 1024)
 | |
| 
 | |
| 	expectedBaseSwap := baseSwapLimit
 | |
| 	expectedIncreasedSwap := increasedSwapLimit
 | |
| 
 | |
| 	if cgroups.Mode() == cgroups.Unified {
 | |
| 		expectedBaseSwap = baseSwapLimit - memoryLimit
 | |
| 		expectedIncreasedSwap = increasedSwapLimit - memoryLimit
 | |
| 	}
 | |
| 
 | |
| 	t.Log("Create a container with memory limit but no swap")
 | |
| 	cnConfig := ContainerConfig(
 | |
| 		"container",
 | |
| 		pauseImage,
 | |
| 		WithResources(&runtime.LinuxContainerResources{
 | |
| 			MemoryLimitInBytes:     memoryLimit,
 | |
| 			MemorySwapLimitInBytes: baseSwapLimit,
 | |
| 		}),
 | |
| 	)
 | |
| 	cn, err := runtimeService.CreateContainer(sb, cnConfig, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	container, err := containerdClient.LoadContainer(context.Background(), cn)
 | |
| 	require.NoError(t, err)
 | |
| 	spec, err := container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	checkMemoryLimit(t, spec, memoryLimit)
 | |
| 	checkMemorySwapLimit(t, spec, &expectedBaseSwap)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	spec, err = container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	sw1 := baseSwapLimit
 | |
| 	checkMemorySwapLimit(t, spec, &sw1)
 | |
| 
 | |
| 	t.Log("Start the container")
 | |
| 	require.NoError(t, runtimeService.StartContainer(cn))
 | |
| 	task, err := container.Task(context.Background(), nil)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in cgroup")
 | |
| 	memLimit := getCgroupMemoryLimitForTask(t, task)
 | |
| 	swapLimit := getCgroupSwapLimitForTask(t, task)
 | |
| 	assert.Equal(t, uint64(memoryLimit), memLimit)
 | |
| 	assert.Equal(t, uint64(expectedBaseSwap), swapLimit)
 | |
| 
 | |
| 	t.Log("Update container memory limit after started")
 | |
| 	err = runtimeService.UpdateContainerResources(cn, &runtime.LinuxContainerResources{
 | |
| 		MemorySwapLimitInBytes: increasedSwapLimit,
 | |
| 	}, nil)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	spec, err = container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	checkMemorySwapLimit(t, spec, &increasedSwapLimit)
 | |
| 
 | |
| 	t.Log("Check memory limit in cgroup")
 | |
| 	swapLimit = getCgroupSwapLimitForTask(t, task)
 | |
| 	assert.Equal(t, uint64(expectedIncreasedSwap), swapLimit)
 | |
| }
 | |
| 
 | |
| func TestUpdateContainerResources_MemoryLimit(t *testing.T) {
 | |
| 	// TODO(claudiub): Make this test work once https://github.com/microsoft/hcsshim/pull/931 merges.
 | |
| 	t.Log("Create a sandbox")
 | |
| 	sb, sbConfig := PodSandboxConfigWithCleanup(t, "sandbox", "update-container-resources")
 | |
| 
 | |
| 	EnsureImageExists(t, pauseImage)
 | |
| 
 | |
| 	t.Log("Create a container with memory limit")
 | |
| 	cnConfig := ContainerConfig(
 | |
| 		"container",
 | |
| 		pauseImage,
 | |
| 		WithResources(&runtime.LinuxContainerResources{
 | |
| 			MemoryLimitInBytes: 200 * 1024 * 1024,
 | |
| 		}),
 | |
| 	)
 | |
| 	cn, err := runtimeService.CreateContainer(sb, cnConfig, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	container, err := containerdClient.LoadContainer(context.Background(), cn)
 | |
| 	require.NoError(t, err)
 | |
| 	spec, err := container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	checkMemoryLimit(t, spec, 200*1024*1024)
 | |
| 
 | |
| 	t.Log("Update container memory limit after created")
 | |
| 	err = runtimeService.UpdateContainerResources(cn, &runtime.LinuxContainerResources{
 | |
| 		MemoryLimitInBytes: 400 * 1024 * 1024,
 | |
| 	}, nil)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	spec, err = container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	checkMemoryLimit(t, spec, 400*1024*1024)
 | |
| 
 | |
| 	t.Log("Start the container")
 | |
| 	require.NoError(t, runtimeService.StartContainer(cn))
 | |
| 	task, err := container.Task(context.Background(), nil)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in cgroup")
 | |
| 	memLimit := getCgroupMemoryLimitForTask(t, task)
 | |
| 	assert.Equal(t, uint64(400*1024*1024), memLimit)
 | |
| 
 | |
| 	t.Log("Update container memory limit after started")
 | |
| 	err = runtimeService.UpdateContainerResources(cn, &runtime.LinuxContainerResources{
 | |
| 		MemoryLimitInBytes: 800 * 1024 * 1024,
 | |
| 	}, nil)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("Check memory limit in container OCI spec")
 | |
| 	spec, err = container.Spec(context.Background())
 | |
| 	require.NoError(t, err)
 | |
| 	checkMemoryLimit(t, spec, 800*1024*1024)
 | |
| 
 | |
| 	t.Log("Check memory limit in cgroup")
 | |
| 	memLimit = getCgroupMemoryLimitForTask(t, task)
 | |
| 	assert.Equal(t, uint64(800*1024*1024), memLimit)
 | |
| }
 |