// +build linux /* * Minio Cloud Storage, (C) 2017 Minio, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // Package cgroup implements parsing for all the cgroup // categories and functionality in a simple way. package cgroup import ( "bufio" "bytes" "fmt" "io" "io/ioutil" "os" "os/exec" "path/filepath" "strconv" "strings" ) // DO NOT EDIT following constants are chosen defaults for any kernel // after 3.x, please open a github issue https://github.com/minio/minio/issues // and discuss first if you wish to change this. const ( // Default string for looking for kernel memory param. memoryLimitKernelParam = "memory.limit_in_bytes" // Points to sys path memory path. cgroupMemSysPath = "/sys/fs/cgroup/memory" // Default docker prefix. dockerPrefixName = "/docker/" // Proc controller group path. cgroupFileTemplate = "/proc/%d/cgroup" ) // CGEntries - represents all the entries in a process cgroup file // at /proc//cgroup as key value pairs. type CGEntries map[string]string // GetEntries reads and parses all the cgroup entries for a given process. func GetEntries(pid int) (CGEntries, error) { r, err := os.Open(fmt.Sprintf(cgroupFileTemplate, pid)) if err != nil { return nil, err } defer r.Close() return parseProcCGroup(r) } // parseProcCGroup - cgroups are always in the following // format once enabled you need to know the pid of the // application you are looking for so that the the // following parsing logic only parses the file located // at /proc//cgroup. // // CGROUP entries id, component and path are always in // the following format. ``ID:COMPONENT:PATH`` // // Following code block parses this information and // returns a procCGroup which is a parsed list of all // the line by line entires from /proc//cgroup. func parseProcCGroup(r io.Reader) (CGEntries, error) { var cgEntries = CGEntries{} // Start reading cgroup categories line by line // and process them into procCGroup structure. scanner := bufio.NewScanner(r) for scanner.Scan() { line := scanner.Text() tokens := strings.SplitN(line, ":", 3) if len(tokens) < 3 { continue } name, path := tokens[1], tokens[2] for _, token := range strings.Split(name, ",") { name = strings.TrimPrefix(token, "name=") cgEntries[name] = path } } // Return upon any error while reading the cgroup categories. if err := scanner.Err(); err != nil { return nil, err } return cgEntries, nil } // Fetch value of the cgroup kernel param from the cgroup manager, // if cgroup manager is configured we should just rely on `cgm` cli // to fetch all the values for us. func getManagerKernValue(cname, path, kernParam string) (limit uint64, err error) { cmd := exec.Command("cgm", "getvalue", cname, path, kernParam) var out bytes.Buffer cmd.Stdout = &out if err = cmd.Run(); err != nil { return 0, err } // Parse the cgm output. limit, err = strconv.ParseUint(strings.TrimSpace(out.String()), 10, 64) return limit, err } // Get cgroup memory limit file path. func getMemoryLimitFilePath(cgPath string) string { path := cgroupMemSysPath // Docker generates weird cgroup paths that don't // really exist on the file system. // // For example on regular Linux OS : // `/user.slice/user-1000.slice/session-1.scope` // // But they exist as a bind mount on Docker and // are not accessible : `/docker/` // // We we will just ignore if there is `/docker` in the // path ignore and fall back to : // `/sys/fs/cgroup/memory/memory.limit_in_bytes` if !strings.HasPrefix(cgPath, dockerPrefixName) { path = filepath.Join(path, cgPath) } // Final path. return filepath.Join(path, memoryLimitKernelParam) } // GetMemoryLimit - Fetches cgroup memory limit either from // a file path at '/sys/fs/cgroup/memory', if path fails then // fallback to querying cgroup manager. func GetMemoryLimit(pid int) (limit uint64, err error) { var cg CGEntries cg, err = GetEntries(pid) if err != nil { return 0, err } path := cg["memory"] limit, err = getManagerKernValue("memory", path, memoryLimitKernelParam) if err != nil { // Upon any failure returned from `cgm`, on some systems cgm // might not be installed. We fallback to using the the sysfs // path instead to lookup memory limits. var b []byte b, err = ioutil.ReadFile(getMemoryLimitFilePath(path)) if err != nil { return 0, err } limit, err = strconv.ParseUint(strings.TrimSpace(string(b)), 10, 64) } return limit, err }