sysinfo.go 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. package sysinfo
  2. import (
  3. "io/ioutil"
  4. "os"
  5. "path"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/docker/libcontainer/cgroups"
  8. )
  9. // SysInfo stores information about which features a kernel supports.
  10. type SysInfo struct {
  11. MemoryLimit bool
  12. SwapLimit bool
  13. CpuCfsQuota bool
  14. IPv4ForwardingDisabled bool
  15. AppArmor bool
  16. }
  17. // New returns a new SysInfo, using the filesystem to detect which features the kernel supports.
  18. func New(quiet bool) *SysInfo {
  19. sysInfo := &SysInfo{}
  20. if cgroupMemoryMountpoint, err := cgroups.FindCgroupMountpoint("memory"); err != nil {
  21. if !quiet {
  22. logrus.Warnf("%v", err)
  23. }
  24. } else {
  25. _, err1 := ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.limit_in_bytes"))
  26. _, err2 := ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.soft_limit_in_bytes"))
  27. sysInfo.MemoryLimit = err1 == nil && err2 == nil
  28. if !sysInfo.MemoryLimit && !quiet {
  29. logrus.Warn("Your kernel does not support cgroup memory limit.")
  30. }
  31. _, err = ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.memsw.limit_in_bytes"))
  32. sysInfo.SwapLimit = err == nil
  33. if !sysInfo.SwapLimit && !quiet {
  34. logrus.Warn("Your kernel does not support cgroup swap limit.")
  35. }
  36. }
  37. if cgroupCpuMountpoint, err := cgroups.FindCgroupMountpoint("cpu"); err != nil {
  38. if !quiet {
  39. logrus.Warnf("%v", err)
  40. }
  41. } else {
  42. _, err1 := ioutil.ReadFile(path.Join(cgroupCpuMountpoint, "cpu.cfs_quota_us"))
  43. sysInfo.CpuCfsQuota = err1 == nil
  44. if !sysInfo.CpuCfsQuota && !quiet {
  45. logrus.Warn("Your kernel does not support cgroup cfs quotas")
  46. }
  47. }
  48. // Check if AppArmor is supported.
  49. if _, err := os.Stat("/sys/kernel/security/apparmor"); os.IsNotExist(err) {
  50. sysInfo.AppArmor = false
  51. } else {
  52. sysInfo.AppArmor = true
  53. }
  54. // Check if Devices cgroup is mounted, it is hard requirement for container security.
  55. if _, err := cgroups.FindCgroupMountpoint("devices"); err != nil {
  56. logrus.Fatalf("Error mounting devices cgroup: %v", err)
  57. }
  58. return sysInfo
  59. }