mirror of
https://github.com/privatevoid-net/nix-super.git
synced 2024-11-15 02:36:16 +02:00
Merge pull request #11412 from parkerhoyes/daemon-cgroup
Move daemon process into sub-cgroup
This commit is contained in:
commit
5e337ee60d
8 changed files with 115 additions and 17 deletions
|
@ -444,25 +444,22 @@ void LocalDerivationGoal::startBuilder()
|
||||||
#if __linux__
|
#if __linux__
|
||||||
experimentalFeatureSettings.require(Xp::Cgroups);
|
experimentalFeatureSettings.require(Xp::Cgroups);
|
||||||
|
|
||||||
|
/* If we're running from the daemon, then this will return the
|
||||||
|
root cgroup of the service. Otherwise, it will return the
|
||||||
|
current cgroup. */
|
||||||
|
auto rootCgroup = getRootCgroup();
|
||||||
auto cgroupFS = getCgroupFS();
|
auto cgroupFS = getCgroupFS();
|
||||||
if (!cgroupFS)
|
if (!cgroupFS)
|
||||||
throw Error("cannot determine the cgroups file system");
|
throw Error("cannot determine the cgroups file system");
|
||||||
|
auto rootCgroupPath = canonPath(*cgroupFS + "/" + rootCgroup);
|
||||||
auto ourCgroups = getCgroups("/proc/self/cgroup");
|
if (!pathExists(rootCgroupPath))
|
||||||
auto ourCgroup = ourCgroups[""];
|
throw Error("expected cgroup directory '%s'", rootCgroupPath);
|
||||||
if (ourCgroup == "")
|
|
||||||
throw Error("cannot determine cgroup name from /proc/self/cgroup");
|
|
||||||
|
|
||||||
auto ourCgroupPath = canonPath(*cgroupFS + "/" + ourCgroup);
|
|
||||||
|
|
||||||
if (!pathExists(ourCgroupPath))
|
|
||||||
throw Error("expected cgroup directory '%s'", ourCgroupPath);
|
|
||||||
|
|
||||||
static std::atomic<unsigned int> counter{0};
|
static std::atomic<unsigned int> counter{0};
|
||||||
|
|
||||||
cgroup = buildUser
|
cgroup = buildUser
|
||||||
? fmt("%s/nix-build-uid-%d", ourCgroupPath, buildUser->getUID())
|
? fmt("%s/nix-build-uid-%d", rootCgroupPath, buildUser->getUID())
|
||||||
: fmt("%s/nix-build-pid-%d-%d", ourCgroupPath, getpid(), counter++);
|
: fmt("%s/nix-build-pid-%d-%d", rootCgroupPath, getpid(), counter++);
|
||||||
|
|
||||||
debug("using cgroup '%s'", *cgroup);
|
debug("using cgroup '%s'", *cgroup);
|
||||||
|
|
||||||
|
|
|
@ -32,11 +32,7 @@ unsigned int getMaxCPU()
|
||||||
auto cgroupFS = getCgroupFS();
|
auto cgroupFS = getCgroupFS();
|
||||||
if (!cgroupFS) return 0;
|
if (!cgroupFS) return 0;
|
||||||
|
|
||||||
auto cgroups = getCgroups("/proc/self/cgroup");
|
auto cpuFile = *cgroupFS + "/" + getCurrentCgroup() + "/cpu.max";
|
||||||
auto cgroup = cgroups[""];
|
|
||||||
if (cgroup == "") return 0;
|
|
||||||
|
|
||||||
auto cpuFile = *cgroupFS + "/" + cgroup + "/cpu.max";
|
|
||||||
|
|
||||||
auto cpuMax = readFile(cpuFile);
|
auto cpuMax = readFile(cpuFile);
|
||||||
auto cpuMaxParts = tokenizeString<std::vector<std::string>>(cpuMax, " \n");
|
auto cpuMaxParts = tokenizeString<std::vector<std::string>>(cpuMax, " \n");
|
||||||
|
|
|
@ -144,4 +144,23 @@ CgroupStats destroyCgroup(const Path & cgroup)
|
||||||
return destroyCgroup(cgroup, true);
|
return destroyCgroup(cgroup, true);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string getCurrentCgroup()
|
||||||
|
{
|
||||||
|
auto cgroupFS = getCgroupFS();
|
||||||
|
if (!cgroupFS)
|
||||||
|
throw Error("cannot determine the cgroups file system");
|
||||||
|
|
||||||
|
auto ourCgroups = getCgroups("/proc/self/cgroup");
|
||||||
|
auto ourCgroup = ourCgroups[""];
|
||||||
|
if (ourCgroup == "")
|
||||||
|
throw Error("cannot determine cgroup name from /proc/self/cgroup");
|
||||||
|
return ourCgroup;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string getRootCgroup()
|
||||||
|
{
|
||||||
|
static std::string rootCgroup = getCurrentCgroup();
|
||||||
|
return rootCgroup;
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,4 +25,13 @@ struct CgroupStats
|
||||||
*/
|
*/
|
||||||
CgroupStats destroyCgroup(const Path & cgroup);
|
CgroupStats destroyCgroup(const Path & cgroup);
|
||||||
|
|
||||||
|
std::string getCurrentCgroup();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the cgroup that should be used as the parent when creating new
|
||||||
|
* sub-cgroups. The first time this is called, the current cgroup will be
|
||||||
|
* returned, and then all subsequent calls will return the original cgroup.
|
||||||
|
*/
|
||||||
|
std::string getRootCgroup();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -33,6 +33,10 @@
|
||||||
#include <grp.h>
|
#include <grp.h>
|
||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
|
|
||||||
|
#if __linux__
|
||||||
|
#include "cgroup.hh"
|
||||||
|
#endif
|
||||||
|
|
||||||
#if __APPLE__ || __FreeBSD__
|
#if __APPLE__ || __FreeBSD__
|
||||||
#include <sys/ucred.h>
|
#include <sys/ucred.h>
|
||||||
#endif
|
#endif
|
||||||
|
@ -312,6 +316,27 @@ static void daemonLoop(std::optional<TrustedFlag> forceTrustClientOpt)
|
||||||
// Get rid of children automatically; don't let them become zombies.
|
// Get rid of children automatically; don't let them become zombies.
|
||||||
setSigChldAction(true);
|
setSigChldAction(true);
|
||||||
|
|
||||||
|
#if __linux__
|
||||||
|
if (settings.useCgroups) {
|
||||||
|
experimentalFeatureSettings.require(Xp::Cgroups);
|
||||||
|
|
||||||
|
// This also sets the root cgroup to the current one.
|
||||||
|
auto rootCgroup = getRootCgroup();
|
||||||
|
auto cgroupFS = getCgroupFS();
|
||||||
|
if (!cgroupFS)
|
||||||
|
throw Error("cannot determine the cgroups file system");
|
||||||
|
auto rootCgroupPath = canonPath(*cgroupFS + "/" + rootCgroup);
|
||||||
|
if (!pathExists(rootCgroupPath))
|
||||||
|
throw Error("expected cgroup directory '%s'", rootCgroupPath);
|
||||||
|
auto daemonCgroupPath = rootCgroupPath + "/nix-daemon";
|
||||||
|
// Create new sub-cgroup for the daemon.
|
||||||
|
if (mkdir(daemonCgroupPath.c_str(), 0755) != 0 && errno != EEXIST)
|
||||||
|
throw SysError("creating cgroup '%s'", daemonCgroupPath);
|
||||||
|
// Move daemon into the new cgroup.
|
||||||
|
writeFile(daemonCgroupPath + "/cgroup.procs", fmt("%d", getpid()));
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
// Loop accepting connections.
|
// Loop accepting connections.
|
||||||
while (1) {
|
while (1) {
|
||||||
|
|
||||||
|
|
40
tests/nixos/cgroups/default.nix
Normal file
40
tests/nixos/cgroups/default.nix
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
{ nixpkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
name = "cgroups";
|
||||||
|
|
||||||
|
nodes =
|
||||||
|
{
|
||||||
|
host =
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
{ virtualisation.additionalPaths = [ pkgs.stdenvNoCC ];
|
||||||
|
nix.extraOptions =
|
||||||
|
''
|
||||||
|
extra-experimental-features = nix-command auto-allocate-uids cgroups
|
||||||
|
extra-system-features = uid-range
|
||||||
|
'';
|
||||||
|
nix.settings.use-cgroups = true;
|
||||||
|
nix.nixPath = [ "nixpkgs=${nixpkgs}" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = { nodes }: ''
|
||||||
|
start_all()
|
||||||
|
|
||||||
|
host.wait_for_unit("multi-user.target")
|
||||||
|
|
||||||
|
# Start build in background
|
||||||
|
host.execute("NIX_REMOTE=daemon nix build --auto-allocate-uids --file ${./hang.nix} >&2 &")
|
||||||
|
service = "/sys/fs/cgroup/system.slice/nix-daemon.service"
|
||||||
|
|
||||||
|
# Wait for cgroups to be created
|
||||||
|
host.succeed(f"until [ -e {service}/nix-daemon ]; do sleep 1; done", timeout=30)
|
||||||
|
host.succeed(f"until [ -e {service}/nix-build-uid-* ]; do sleep 1; done", timeout=30)
|
||||||
|
|
||||||
|
# Check that there aren't processes where there shouldn't be, and that there are where there should be
|
||||||
|
host.succeed(f'[ -z "$(cat {service}/cgroup.procs)" ]')
|
||||||
|
host.succeed(f'[ -n "$(cat {service}/nix-daemon/cgroup.procs)" ]')
|
||||||
|
host.succeed(f'[ -n "$(cat {service}/nix-build-uid-*/cgroup.procs)" ]')
|
||||||
|
'';
|
||||||
|
|
||||||
|
}
|
10
tests/nixos/cgroups/hang.nix
Normal file
10
tests/nixos/cgroups/hang.nix
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
{ }:
|
||||||
|
|
||||||
|
with import <nixpkgs> {};
|
||||||
|
|
||||||
|
runCommand "hang"
|
||||||
|
{ requiredSystemFeatures = "uid-range";
|
||||||
|
}
|
||||||
|
''
|
||||||
|
sleep infinity
|
||||||
|
''
|
|
@ -157,4 +157,6 @@ in
|
||||||
s3-binary-cache-store = runNixOSTestFor "x86_64-linux" ./s3-binary-cache-store.nix;
|
s3-binary-cache-store = runNixOSTestFor "x86_64-linux" ./s3-binary-cache-store.nix;
|
||||||
|
|
||||||
fsync = runNixOSTestFor "x86_64-linux" ./fsync.nix;
|
fsync = runNixOSTestFor "x86_64-linux" ./fsync.nix;
|
||||||
|
|
||||||
|
cgroups = runNixOSTestFor "x86_64-linux" ./cgroups;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue