github.com/sams1990/dockerrepo@v17.12.1-ce-rc2+incompatible/pkg/sysinfo/sysinfo_linux.go (about) 1 package sysinfo 2 3 import ( 4 "fmt" 5 "io/ioutil" 6 "os" 7 "path" 8 "strings" 9 10 "github.com/opencontainers/runc/libcontainer/cgroups" 11 "github.com/sirupsen/logrus" 12 "golang.org/x/sys/unix" 13 ) 14 15 func findCgroupMountpoints() (map[string]string, error) { 16 cgMounts, err := cgroups.GetCgroupMounts(false) 17 if err != nil { 18 return nil, fmt.Errorf("Failed to parse cgroup information: %v", err) 19 } 20 mps := make(map[string]string) 21 for _, m := range cgMounts { 22 for _, ss := range m.Subsystems { 23 mps[ss] = m.Mountpoint 24 } 25 } 26 return mps, nil 27 } 28 29 // New returns a new SysInfo, using the filesystem to detect which features 30 // the kernel supports. If `quiet` is `false` warnings are printed in logs 31 // whenever an error occurs or misconfigurations are present. 32 func New(quiet bool) *SysInfo { 33 sysInfo := &SysInfo{} 34 cgMounts, err := findCgroupMountpoints() 35 if err != nil { 36 logrus.Warnf("Failed to parse cgroup information: %v", err) 37 } else { 38 sysInfo.cgroupMemInfo = checkCgroupMem(cgMounts, quiet) 39 sysInfo.cgroupCPUInfo = checkCgroupCPU(cgMounts, quiet) 40 sysInfo.cgroupBlkioInfo = checkCgroupBlkioInfo(cgMounts, quiet) 41 sysInfo.cgroupCpusetInfo = checkCgroupCpusetInfo(cgMounts, quiet) 42 sysInfo.cgroupPids = checkCgroupPids(quiet) 43 } 44 45 _, ok := cgMounts["devices"] 46 sysInfo.CgroupDevicesEnabled = ok 47 48 sysInfo.IPv4ForwardingDisabled = !readProcBool("/proc/sys/net/ipv4/ip_forward") 49 sysInfo.BridgeNFCallIPTablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables") 50 sysInfo.BridgeNFCallIP6TablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables") 51 52 // Check if AppArmor is supported. 53 if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) { 54 sysInfo.AppArmor = true 55 } 56 57 // Check if Seccomp is supported, via CONFIG_SECCOMP. 58 if err := unix.Prctl(unix.PR_GET_SECCOMP, 0, 0, 0, 0); err != unix.EINVAL { 59 // Make sure the kernel has CONFIG_SECCOMP_FILTER. 60 if err := unix.Prctl(unix.PR_SET_SECCOMP, unix.SECCOMP_MODE_FILTER, 0, 0, 0); err != unix.EINVAL { 61 sysInfo.Seccomp = true 62 } 63 } 64 65 return sysInfo 66 } 67 68 // checkCgroupMem reads the memory information from the memory cgroup mount point. 69 func checkCgroupMem(cgMounts map[string]string, quiet bool) cgroupMemInfo { 70 mountPoint, ok := cgMounts["memory"] 71 if !ok { 72 if !quiet { 73 logrus.Warn("Your kernel does not support cgroup memory limit") 74 } 75 return cgroupMemInfo{} 76 } 77 78 swapLimit := cgroupEnabled(mountPoint, "memory.memsw.limit_in_bytes") 79 if !quiet && !swapLimit { 80 logrus.Warn("Your kernel does not support swap memory limit") 81 } 82 memoryReservation := cgroupEnabled(mountPoint, "memory.soft_limit_in_bytes") 83 if !quiet && !memoryReservation { 84 logrus.Warn("Your kernel does not support memory reservation") 85 } 86 oomKillDisable := cgroupEnabled(mountPoint, "memory.oom_control") 87 if !quiet && !oomKillDisable { 88 logrus.Warn("Your kernel does not support oom control") 89 } 90 memorySwappiness := cgroupEnabled(mountPoint, "memory.swappiness") 91 if !quiet && !memorySwappiness { 92 logrus.Warn("Your kernel does not support memory swappiness") 93 } 94 kernelMemory := cgroupEnabled(mountPoint, "memory.kmem.limit_in_bytes") 95 if !quiet && !kernelMemory { 96 logrus.Warn("Your kernel does not support kernel memory limit") 97 } 98 99 return cgroupMemInfo{ 100 MemoryLimit: true, 101 SwapLimit: swapLimit, 102 MemoryReservation: memoryReservation, 103 OomKillDisable: oomKillDisable, 104 MemorySwappiness: memorySwappiness, 105 KernelMemory: kernelMemory, 106 } 107 } 108 109 // checkCgroupCPU reads the cpu information from the cpu cgroup mount point. 110 func checkCgroupCPU(cgMounts map[string]string, quiet bool) cgroupCPUInfo { 111 mountPoint, ok := cgMounts["cpu"] 112 if !ok { 113 if !quiet { 114 logrus.Warn("Unable to find cpu cgroup in mounts") 115 } 116 return cgroupCPUInfo{} 117 } 118 119 cpuShares := cgroupEnabled(mountPoint, "cpu.shares") 120 if !quiet && !cpuShares { 121 logrus.Warn("Your kernel does not support cgroup cpu shares") 122 } 123 124 cpuCfsPeriod := cgroupEnabled(mountPoint, "cpu.cfs_period_us") 125 if !quiet && !cpuCfsPeriod { 126 logrus.Warn("Your kernel does not support cgroup cfs period") 127 } 128 129 cpuCfsQuota := cgroupEnabled(mountPoint, "cpu.cfs_quota_us") 130 if !quiet && !cpuCfsQuota { 131 logrus.Warn("Your kernel does not support cgroup cfs quotas") 132 } 133 134 cpuRealtimePeriod := cgroupEnabled(mountPoint, "cpu.rt_period_us") 135 if !quiet && !cpuRealtimePeriod { 136 logrus.Warn("Your kernel does not support cgroup rt period") 137 } 138 139 cpuRealtimeRuntime := cgroupEnabled(mountPoint, "cpu.rt_runtime_us") 140 if !quiet && !cpuRealtimeRuntime { 141 logrus.Warn("Your kernel does not support cgroup rt runtime") 142 } 143 144 return cgroupCPUInfo{ 145 CPUShares: cpuShares, 146 CPUCfsPeriod: cpuCfsPeriod, 147 CPUCfsQuota: cpuCfsQuota, 148 CPURealtimePeriod: cpuRealtimePeriod, 149 CPURealtimeRuntime: cpuRealtimeRuntime, 150 } 151 } 152 153 // checkCgroupBlkioInfo reads the blkio information from the blkio cgroup mount point. 154 func checkCgroupBlkioInfo(cgMounts map[string]string, quiet bool) cgroupBlkioInfo { 155 mountPoint, ok := cgMounts["blkio"] 156 if !ok { 157 if !quiet { 158 logrus.Warn("Unable to find blkio cgroup in mounts") 159 } 160 return cgroupBlkioInfo{} 161 } 162 163 weight := cgroupEnabled(mountPoint, "blkio.weight") 164 if !quiet && !weight { 165 logrus.Warn("Your kernel does not support cgroup blkio weight") 166 } 167 168 weightDevice := cgroupEnabled(mountPoint, "blkio.weight_device") 169 if !quiet && !weightDevice { 170 logrus.Warn("Your kernel does not support cgroup blkio weight_device") 171 } 172 173 readBpsDevice := cgroupEnabled(mountPoint, "blkio.throttle.read_bps_device") 174 if !quiet && !readBpsDevice { 175 logrus.Warn("Your kernel does not support cgroup blkio throttle.read_bps_device") 176 } 177 178 writeBpsDevice := cgroupEnabled(mountPoint, "blkio.throttle.write_bps_device") 179 if !quiet && !writeBpsDevice { 180 logrus.Warn("Your kernel does not support cgroup blkio throttle.write_bps_device") 181 } 182 readIOpsDevice := cgroupEnabled(mountPoint, "blkio.throttle.read_iops_device") 183 if !quiet && !readIOpsDevice { 184 logrus.Warn("Your kernel does not support cgroup blkio throttle.read_iops_device") 185 } 186 187 writeIOpsDevice := cgroupEnabled(mountPoint, "blkio.throttle.write_iops_device") 188 if !quiet && !writeIOpsDevice { 189 logrus.Warn("Your kernel does not support cgroup blkio throttle.write_iops_device") 190 } 191 return cgroupBlkioInfo{ 192 BlkioWeight: weight, 193 BlkioWeightDevice: weightDevice, 194 BlkioReadBpsDevice: readBpsDevice, 195 BlkioWriteBpsDevice: writeBpsDevice, 196 BlkioReadIOpsDevice: readIOpsDevice, 197 BlkioWriteIOpsDevice: writeIOpsDevice, 198 } 199 } 200 201 // checkCgroupCpusetInfo reads the cpuset information from the cpuset cgroup mount point. 202 func checkCgroupCpusetInfo(cgMounts map[string]string, quiet bool) cgroupCpusetInfo { 203 mountPoint, ok := cgMounts["cpuset"] 204 if !ok { 205 if !quiet { 206 logrus.Warn("Unable to find cpuset cgroup in mounts") 207 } 208 return cgroupCpusetInfo{} 209 } 210 211 cpus, err := ioutil.ReadFile(path.Join(mountPoint, "cpuset.cpus")) 212 if err != nil { 213 return cgroupCpusetInfo{} 214 } 215 216 mems, err := ioutil.ReadFile(path.Join(mountPoint, "cpuset.mems")) 217 if err != nil { 218 return cgroupCpusetInfo{} 219 } 220 221 return cgroupCpusetInfo{ 222 Cpuset: true, 223 Cpus: strings.TrimSpace(string(cpus)), 224 Mems: strings.TrimSpace(string(mems)), 225 } 226 } 227 228 // checkCgroupPids reads the pids information from the pids cgroup mount point. 229 func checkCgroupPids(quiet bool) cgroupPids { 230 _, err := cgroups.FindCgroupMountpoint("pids") 231 if err != nil { 232 if !quiet { 233 logrus.Warn(err) 234 } 235 return cgroupPids{} 236 } 237 238 return cgroupPids{ 239 PidsLimit: true, 240 } 241 } 242 243 func cgroupEnabled(mountPoint, name string) bool { 244 _, err := os.Stat(path.Join(mountPoint, name)) 245 return err == nil 246 } 247 248 func readProcBool(path string) bool { 249 val, err := ioutil.ReadFile(path) 250 if err != nil { 251 return false 252 } 253 return strings.TrimSpace(string(val)) == "1" 254 }