@@ -36,8 +36,6 @@ import (
36
36
37
37
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
38
38
"k8s.io/apimachinery/pkg/util/sets"
39
- utilfeature "k8s.io/apiserver/pkg/util/feature"
40
- kubefeatures "k8s.io/kubernetes/pkg/features"
41
39
cmutil "k8s.io/kubernetes/pkg/kubelet/cm/util"
42
40
"k8s.io/kubernetes/pkg/kubelet/metrics"
43
41
)
@@ -275,11 +273,8 @@ func (m *cgroupManagerImpl) Exists(name CgroupName) bool {
275
273
// scoped to the set control groups it understands. this is being discussed
276
274
// in https://github.com/opencontainers/runc/issues/1440
277
275
// once resolved, we can remove this code.
278
- whitelistControllers := sets .NewString ("cpu" , "cpuacct" , "cpuset" , "memory" , "systemd" )
276
+ whitelistControllers := sets .NewString ("cpu" , "cpuacct" , "cpuset" , "memory" , "systemd" , "pids" )
279
277
280
- if utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportPodPidsLimit ) || utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportNodePidsLimit ) {
281
- whitelistControllers .Insert ("pids" )
282
- }
283
278
if _ , ok := m .subsystems .MountPoints ["hugetlb" ]; ok {
284
279
whitelistControllers .Insert ("hugetlb" )
285
280
}
@@ -348,13 +343,10 @@ func getSupportedSubsystems() map[subsystem]bool {
348
343
supportedSubsystems := map [subsystem ]bool {
349
344
& cgroupfs.MemoryGroup {}: true ,
350
345
& cgroupfs.CpuGroup {}: true ,
351
- & cgroupfs.PidsGroup {}: false ,
346
+ & cgroupfs.PidsGroup {}: true ,
352
347
}
353
348
// not all hosts support hugetlb cgroup, and in the absent of hugetlb, we will fail silently by reporting no capacity.
354
349
supportedSubsystems [& cgroupfs.HugetlbGroup {}] = false
355
- if utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportPodPidsLimit ) || utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportNodePidsLimit ) {
356
- supportedSubsystems [& cgroupfs.PidsGroup {}] = true
357
- }
358
350
return supportedSubsystems
359
351
}
360
352
@@ -413,10 +405,7 @@ var (
413
405
// getSupportedUnifiedControllers returns a set of supported controllers when running on cgroup v2
414
406
func getSupportedUnifiedControllers () sets.String {
415
407
// This is the set of controllers used by the Kubelet
416
- supportedControllers := sets .NewString ("cpu" , "cpuset" , "memory" , "hugetlb" )
417
- if utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportPodPidsLimit ) || utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportNodePidsLimit ) {
418
- supportedControllers .Insert ("pids" )
419
- }
408
+ supportedControllers := sets .NewString ("cpu" , "cpuset" , "memory" , "hugetlb" , "pids" )
420
409
// Memoize the set of controllers that are present in the root cgroup
421
410
availableRootControllersOnce .Do (func () {
422
411
var err error
@@ -540,10 +529,8 @@ func (m *cgroupManagerImpl) toResources(resourceConfig *ResourceConfig) *libcont
540
529
if resourceConfig .CpuPeriod != nil {
541
530
resources .CpuPeriod = * resourceConfig .CpuPeriod
542
531
}
543
- if utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportPodPidsLimit ) || utilfeature .DefaultFeatureGate .Enabled (kubefeatures .SupportNodePidsLimit ) {
544
- if resourceConfig .PidsLimit != nil {
545
- resources .PidsLimit = * resourceConfig .PidsLimit
546
- }
532
+ if resourceConfig .PidsLimit != nil {
533
+ resources .PidsLimit = * resourceConfig .PidsLimit
547
534
}
548
535
// if huge pages are enabled, we set them in libcontainer
549
536
// for each page size enumerated, set that value
@@ -601,7 +588,7 @@ func (m *cgroupManagerImpl) Update(cgroupConfig *CgroupConfig) error {
601
588
updateSystemdCgroupInfo (libcontainerCgroupConfig , cgroupConfig .Name )
602
589
}
603
590
604
- if utilfeature . DefaultFeatureGate . Enabled ( kubefeatures . SupportPodPidsLimit ) && cgroupConfig .ResourceParameters != nil && cgroupConfig .ResourceParameters .PidsLimit != nil {
591
+ if cgroupConfig .ResourceParameters != nil && cgroupConfig .ResourceParameters .PidsLimit != nil {
605
592
libcontainerCgroupConfig .PidsLimit = * cgroupConfig .ResourceParameters .PidsLimit
606
593
}
607
594
@@ -637,7 +624,7 @@ func (m *cgroupManagerImpl) Create(cgroupConfig *CgroupConfig) error {
637
624
libcontainerCgroupConfig .Path = cgroupConfig .Name .ToCgroupfs ()
638
625
}
639
626
640
- if utilfeature . DefaultFeatureGate . Enabled ( kubefeatures . SupportPodPidsLimit ) && cgroupConfig .ResourceParameters != nil && cgroupConfig .ResourceParameters .PidsLimit != nil {
627
+ if cgroupConfig .ResourceParameters != nil && cgroupConfig .ResourceParameters .PidsLimit != nil {
641
628
libcontainerCgroupConfig .PidsLimit = * cgroupConfig .ResourceParameters .PidsLimit
642
629
}
643
630
0 commit comments