1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/vendor/github.com/containerd/cgroups
Sebastiaan van Stijn e5d28115ee
vendor: regenerate
- all changes here are attributed to difference in behaviour between,
  namely:
  - resolution of secondary test dependencies
  - prunning of non-Go files

Signed-off-by: Ilya Dmitrichenko <errordeveloper@gmail.com>
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-01-18 15:46:04 +01:00
..
stats/v1 vendor: regenerate 2022-01-18 15:46:04 +01:00
v2 vendor: regenerate 2022-01-18 15:46:04 +01:00
.gitignore vendor: regenerate 2022-01-18 15:46:04 +01:00
blkio.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
cgroup.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
control.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
cpu.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
cpuacct.go bump containerd/cgroups 5fbad35c2a7e855762d3c60f2e474ffcad0d470a 2019-10-31 01:09:12 +01:00
cpuset.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
devices.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
errors.go containerd: update to 1.0.3 release 2018-04-02 13:42:49 -07:00
freezer.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
hierarchy.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
hugetlb.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
LICENSE Vendor containerd 1.0 2017-10-19 13:19:41 -07:00
Makefile vendor: regenerate 2022-01-18 15:46:04 +01:00
memory.go vendor: github.com/containerd/cgroups 0b889c03f102012f1d93a97ddd3ef71cd6f4f510 2020-11-19 10:30:52 +01:00
named.go containerd: update to 1.0.3 release 2018-04-02 13:42:49 -07:00
net_cls.go vendor: github.com/containerd/cgroups v1.0.1 2021-06-04 16:27:37 +02:00
net_prio.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
opts.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
paths.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
perf_event.go containerd: update to 1.0.3 release 2018-04-02 13:42:49 -07:00
pids.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
Protobuild.toml vendor: regenerate 2022-01-18 15:46:04 +01:00
rdma.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
README.md vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
state.go containerd: update to 1.0.3 release 2018-04-02 13:42:49 -07:00
subsystem.go vendor: github.com/containerd/cgroups v1.0.1 2021-06-04 16:27:37 +02:00
systemd.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
ticks.go containerd: update to 1.0.3 release 2018-04-02 13:42:49 -07:00
utils.go vendor: github.com/containerd/cgroups v1.0.1 2021-06-04 16:27:37 +02:00
v1.go vendor: update containerd/cgroups 2020-07-30 14:31:17 +09:00
Vagrantfile vendor: regenerate 2022-01-18 15:46:04 +01:00

cgroups

Build Status codecov GoDoc Go Report Card

Go package for creating, managing, inspecting, and destroying cgroups. The resources format for settings on the cgroup uses the OCI runtime-spec found here.

Examples

Create a new cgroup

This creates a new cgroup using a static path for all subsystems under /test.

  • /sys/fs/cgroup/cpu/test
  • /sys/fs/cgroup/memory/test
  • etc....

It uses a single hierarchy and specifies cpu shares as a resource constraint and uses the v1 implementation of cgroups.

shares := uint64(100)
control, err := cgroups.New(cgroups.V1, cgroups.StaticPath("/test"), &specs.LinuxResources{
    CPU: &specs.CPU{
        Shares: &shares,
    },
})
defer control.Delete()

Create with systemd slice support

control, err := cgroups.New(cgroups.Systemd, cgroups.Slice("system.slice", "runc-test"), &specs.LinuxResources{
    CPU: &specs.CPU{
        Shares: &shares,
    },
})

Load an existing cgroup

control, err = cgroups.Load(cgroups.V1, cgroups.StaticPath("/test"))

Add a process to the cgroup

if err := control.Add(cgroups.Process{Pid:1234}); err != nil {
}

Update the cgroup

To update the resources applied in the cgroup

shares = uint64(200)
if err := control.Update(&specs.LinuxResources{
    CPU: &specs.LinuxCPU{
        Shares: &shares,
    },
}); err != nil {
}

Freeze and Thaw the cgroup

if err := control.Freeze(); err != nil {
}
if err := control.Thaw(); err != nil {
}

List all processes in the cgroup or recursively

processes, err := control.Processes(cgroups.Devices, recursive)

Get Stats on the cgroup

stats, err := control.Stat()

By adding cgroups.IgnoreNotExist all non-existent files will be ignored, e.g. swap memory stats without swap enabled

stats, err := control.Stat(cgroups.IgnoreNotExist)

Move process across cgroups

This allows you to take processes from one cgroup and move them to another.

err := control.MoveTo(destination)

Create subcgroup

subCgroup, err := control.New("child", resources)

Registering for memory events

This allows you to get notified by an eventfd for v1 memory cgroups events.

event := cgroups.MemoryThresholdEvent(50 * 1024 * 1024, false)
efd, err := control.RegisterMemoryEvent(event)
event := cgroups.MemoryPressureEvent(cgroups.MediumPressure, cgroups.DefaultMode)
efd, err := control.RegisterMemoryEvent(event)
efd, err := control.OOMEventFD()
// or by using RegisterMemoryEvent
event := cgroups.OOMEvent()
efd, err := control.RegisterMemoryEvent(event)

Attention

All static path should not include /sys/fs/cgroup/ prefix, it should start with your own cgroups name

Project details

Cgroups is a containerd sub-project, licensed under the Apache 2.0 license. As a containerd sub-project, you will find the:

information in our containerd/project repository.