123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132 |
- package sysinfo
- import (
- "io/ioutil"
- "os"
- "path"
- "strings"
- "github.com/Sirupsen/logrus"
- "github.com/opencontainers/runc/libcontainer/cgroups"
- )
- // New returns a new SysInfo, using the filesystem to detect which features the kernel supports.
- func New(quiet bool) *SysInfo {
- sysInfo := &SysInfo{}
- sysInfo.cgroupMemInfo = checkCgroupMem(quiet)
- sysInfo.cgroupCPUInfo = checkCgroupCPU(quiet)
- sysInfo.cgroupBlkioInfo = checkCgroupBlkioInfo(quiet)
- sysInfo.cgroupCpusetInfo = checkCgroupCpusetInfo(quiet)
- _, err := cgroups.FindCgroupMountpoint("devices")
- sysInfo.CgroupDevicesEnabled = err == nil
- sysInfo.IPv4ForwardingDisabled = !readProcBool("/proc/sys/net/ipv4/ip_forward")
- sysInfo.BridgeNfCallIptablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables")
- sysInfo.BridgeNfCallIP6tablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables")
- // Check if AppArmor is supported.
- if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) {
- sysInfo.AppArmor = true
- }
- return sysInfo
- }
- func checkCgroupMem(quiet bool) *cgroupMemInfo {
- info := &cgroupMemInfo{}
- mountPoint, err := cgroups.FindCgroupMountpoint("memory")
- if err != nil {
- if !quiet {
- logrus.Warnf("Your kernel does not support cgroup memory limit: %v", err)
- }
- return info
- }
- info.MemoryLimit = true
- info.SwapLimit = cgroupEnabled(mountPoint, "memory.memsw.limit_in_bytes")
- if !quiet && !info.SwapLimit {
- logrus.Warn("Your kernel does not support swap memory limit.")
- }
- info.OomKillDisable = cgroupEnabled(mountPoint, "memory.oom_control")
- if !quiet && !info.OomKillDisable {
- logrus.Warnf("Your kernel does not support oom control.")
- }
- info.MemorySwappiness = cgroupEnabled(mountPoint, "memory.swappiness")
- if !quiet && !info.MemorySwappiness {
- logrus.Warnf("Your kernel does not support memory swappiness.")
- }
- return info
- }
- func checkCgroupCPU(quiet bool) *cgroupCPUInfo {
- info := &cgroupCPUInfo{}
- mountPoint, err := cgroups.FindCgroupMountpoint("cpu")
- if err != nil {
- if !quiet {
- logrus.Warn(err)
- }
- return info
- }
- info.CPUShares = cgroupEnabled(mountPoint, "cpu.shares")
- if !quiet && !info.CPUShares {
- logrus.Warn("Your kernel does not support cgroup cpu shares")
- }
- info.CPUCfsPeriod = cgroupEnabled(mountPoint, "cpu.cfs_period_us")
- if !quiet && !info.CPUCfsPeriod {
- logrus.Warn("Your kernel does not support cgroup cfs period")
- }
- info.CPUCfsQuota = cgroupEnabled(mountPoint, "cpu.cfs_quota_us")
- if !quiet && !info.CPUCfsQuota {
- logrus.Warn("Your kernel does not support cgroup cfs quotas")
- }
- return info
- }
- func checkCgroupBlkioInfo(quiet bool) *cgroupBlkioInfo {
- info := &cgroupBlkioInfo{}
- mountPoint, err := cgroups.FindCgroupMountpoint("blkio")
- if err != nil {
- if !quiet {
- logrus.Warn(err)
- }
- return info
- }
- info.BlkioWeight = cgroupEnabled(mountPoint, "blkio.weight")
- if !quiet && !info.BlkioWeight {
- logrus.Warn("Your kernel does not support cgroup blkio weight")
- }
- return info
- }
- func checkCgroupCpusetInfo(quiet bool) *cgroupCpusetInfo {
- info := &cgroupCpusetInfo{}
- _, err := cgroups.FindCgroupMountpoint("cpuset")
- if err != nil {
- if !quiet {
- logrus.Warn(err)
- }
- return info
- }
- info.Cpuset = true
- return info
- }
- func cgroupEnabled(mountPoint, name string) bool {
- _, err := os.Stat(path.Join(mountPoint, name))
- return err == nil
- }
- func readProcBool(path string) bool {
- val, err := ioutil.ReadFile(path)
- if err != nil {
- return false
- }
- return strings.TrimSpace(string(val)) == "1"
- }
|