123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306 |
- package sysinfo // import "github.com/docker/docker/pkg/sysinfo"
- import (
- "context"
- "fmt"
- "os"
- "path"
- "strings"
- "sync"
- "github.com/containerd/cgroups/v3"
- "github.com/containerd/cgroups/v3/cgroup1"
- "github.com/containerd/containerd/pkg/seccomp"
- "github.com/containerd/log"
- "github.com/moby/sys/mountinfo"
- )
- var (
- readMountinfoOnce sync.Once
- readMountinfoErr error
- cgroupMountinfo []*mountinfo.Info
- )
- // readCgroupMountinfo returns a list of cgroup v1 mounts (i.e. the ones
- // with fstype of "cgroup") for the current running process.
- //
- // The results are cached (to avoid re-reading mountinfo which is relatively
- // expensive), so it is assumed that cgroup mounts are not being changed.
- func readCgroupMountinfo() ([]*mountinfo.Info, error) {
- readMountinfoOnce.Do(func() {
- cgroupMountinfo, readMountinfoErr = mountinfo.GetMounts(
- mountinfo.FSTypeFilter("cgroup"),
- )
- })
- return cgroupMountinfo, readMountinfoErr
- }
- func findCgroupV1Mountpoints() (map[string]string, error) {
- mounts, err := readCgroupMountinfo()
- if err != nil {
- return nil, err
- }
- allSubsystems, err := cgroup1.ParseCgroupFile("/proc/self/cgroup")
- if err != nil {
- return nil, fmt.Errorf("Failed to parse cgroup information: %v", err)
- }
- allMap := make(map[string]bool)
- for s := range allSubsystems {
- allMap[s] = false
- }
- mps := make(map[string]string)
- for _, mi := range mounts {
- for _, opt := range strings.Split(mi.VFSOptions, ",") {
- seen, known := allMap[opt]
- if known && !seen {
- allMap[opt] = true
- mps[strings.TrimPrefix(opt, "name=")] = mi.Mountpoint
- }
- }
- if len(mps) >= len(allMap) {
- break
- }
- }
- return mps, nil
- }
- type infoCollector func(info *SysInfo)
- // WithCgroup2GroupPath specifies the cgroup v2 group path to inspect availability
- // of the controllers.
- //
- // WithCgroup2GroupPath is expected to be used for rootless mode with systemd driver.
- //
- // e.g. g = "/user.slice/user-1000.slice/user@1000.service"
- func WithCgroup2GroupPath(g string) Opt {
- return func(o *SysInfo) {
- if p := path.Clean(g); p != "" {
- o.cg2GroupPath = p
- }
- }
- }
- // New returns a new SysInfo, using the filesystem to detect which features
- // the kernel supports.
- func New(options ...Opt) *SysInfo {
- if cgroups.Mode() == cgroups.Unified {
- return newV2(options...)
- }
- return newV1()
- }
- func newV1() *SysInfo {
- var (
- err error
- sysInfo = &SysInfo{}
- )
- ops := []infoCollector{
- applyNetworkingInfo,
- applyAppArmorInfo,
- applySeccompInfo,
- applyCgroupNsInfo,
- }
- sysInfo.cgMounts, err = findCgroupV1Mountpoints()
- if err != nil {
- log.G(context.TODO()).Warn(err)
- } else {
- ops = append(ops,
- applyMemoryCgroupInfo,
- applyCPUCgroupInfo,
- applyBlkioCgroupInfo,
- applyCPUSetCgroupInfo,
- applyPIDSCgroupInfo,
- applyDevicesCgroupInfo,
- )
- }
- for _, o := range ops {
- o(sysInfo)
- }
- return sysInfo
- }
- // applyMemoryCgroupInfo adds the memory cgroup controller information to the info.
- func applyMemoryCgroupInfo(info *SysInfo) {
- mountPoint, ok := info.cgMounts["memory"]
- if !ok {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup memory limit")
- return
- }
- info.MemoryLimit = ok
- info.SwapLimit = cgroupEnabled(mountPoint, "memory.memsw.limit_in_bytes")
- if !info.SwapLimit {
- info.Warnings = append(info.Warnings, "Your kernel does not support swap memory limit")
- }
- info.MemoryReservation = cgroupEnabled(mountPoint, "memory.soft_limit_in_bytes")
- if !info.MemoryReservation {
- info.Warnings = append(info.Warnings, "Your kernel does not support memory reservation")
- }
- info.OomKillDisable = cgroupEnabled(mountPoint, "memory.oom_control")
- if !info.OomKillDisable {
- info.Warnings = append(info.Warnings, "Your kernel does not support oom control")
- }
- info.MemorySwappiness = cgroupEnabled(mountPoint, "memory.swappiness")
- if !info.MemorySwappiness {
- info.Warnings = append(info.Warnings, "Your kernel does not support memory swappiness")
- }
- // Option is deprecated, but still accepted on API < v1.42 with cgroups v1,
- // so setting the field to allow feature detection.
- info.KernelMemory = cgroupEnabled(mountPoint, "memory.kmem.limit_in_bytes")
- // Option is deprecated in runc, but still accepted in our API, so setting
- // the field to allow feature detection, but don't warn if it's missing, to
- // make the daemon logs a bit less noisy.
- info.KernelMemoryTCP = cgroupEnabled(mountPoint, "memory.kmem.tcp.limit_in_bytes")
- }
- // applyCPUCgroupInfo adds the cpu cgroup controller information to the info.
- func applyCPUCgroupInfo(info *SysInfo) {
- mountPoint, ok := info.cgMounts["cpu"]
- if !ok {
- info.Warnings = append(info.Warnings, "Unable to find cpu cgroup in mounts")
- return
- }
- info.CPUShares = cgroupEnabled(mountPoint, "cpu.shares")
- if !info.CPUShares {
- info.Warnings = append(info.Warnings, "Your kernel does not support CPU shares")
- }
- info.CPUCfs = cgroupEnabled(mountPoint, "cpu.cfs_quota_us")
- if !info.CPUCfs {
- info.Warnings = append(info.Warnings, "Your kernel does not support CPU CFS scheduler")
- }
- info.CPURealtime = cgroupEnabled(mountPoint, "cpu.rt_period_us")
- if !info.CPURealtime {
- info.Warnings = append(info.Warnings, "Your kernel does not support CPU realtime scheduler")
- }
- }
- // applyBlkioCgroupInfo adds the blkio cgroup controller information to the info.
- func applyBlkioCgroupInfo(info *SysInfo) {
- mountPoint, ok := info.cgMounts["blkio"]
- if !ok {
- info.Warnings = append(info.Warnings, "Unable to find blkio cgroup in mounts")
- return
- }
- info.BlkioWeight = cgroupEnabled(mountPoint, "blkio.weight")
- if !info.BlkioWeight {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio weight")
- }
- info.BlkioWeightDevice = cgroupEnabled(mountPoint, "blkio.weight_device")
- if !info.BlkioWeightDevice {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio weight_device")
- }
- info.BlkioReadBpsDevice = cgroupEnabled(mountPoint, "blkio.throttle.read_bps_device")
- if !info.BlkioReadBpsDevice {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio throttle.read_bps_device")
- }
- info.BlkioWriteBpsDevice = cgroupEnabled(mountPoint, "blkio.throttle.write_bps_device")
- if !info.BlkioWriteBpsDevice {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio throttle.write_bps_device")
- }
- info.BlkioReadIOpsDevice = cgroupEnabled(mountPoint, "blkio.throttle.read_iops_device")
- if !info.BlkioReadIOpsDevice {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio throttle.read_iops_device")
- }
- info.BlkioWriteIOpsDevice = cgroupEnabled(mountPoint, "blkio.throttle.write_iops_device")
- if !info.BlkioWriteIOpsDevice {
- info.Warnings = append(info.Warnings, "Your kernel does not support cgroup blkio throttle.write_iops_device")
- }
- }
- // applyCPUSetCgroupInfo adds the cpuset cgroup controller information to the info.
- func applyCPUSetCgroupInfo(info *SysInfo) {
- mountPoint, ok := info.cgMounts["cpuset"]
- if !ok {
- info.Warnings = append(info.Warnings, "Unable to find cpuset cgroup in mounts")
- return
- }
- info.Cpuset = ok
- var err error
- cpus, err := os.ReadFile(path.Join(mountPoint, "cpuset.cpus"))
- if err != nil {
- return
- }
- info.Cpus = strings.TrimSpace(string(cpus))
- mems, err := os.ReadFile(path.Join(mountPoint, "cpuset.mems"))
- if err != nil {
- return
- }
- info.Mems = strings.TrimSpace(string(mems))
- }
- // applyPIDSCgroupInfo adds whether the pids cgroup controller is available to the info.
- func applyPIDSCgroupInfo(info *SysInfo) {
- _, ok := info.cgMounts["pids"]
- if !ok {
- info.Warnings = append(info.Warnings, "Unable to find pids cgroup in mounts")
- return
- }
- info.PidsLimit = true
- }
- // applyDevicesCgroupInfo adds whether the devices cgroup controller is available to the info.
- func applyDevicesCgroupInfo(info *SysInfo) {
- _, ok := info.cgMounts["devices"]
- info.CgroupDevicesEnabled = ok
- }
- // applyNetworkingInfo adds networking information to the info.
- func applyNetworkingInfo(info *SysInfo) {
- info.IPv4ForwardingDisabled = !readProcBool("/proc/sys/net/ipv4/ip_forward")
- info.BridgeNFCallIPTablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables")
- info.BridgeNFCallIP6TablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables")
- }
- // applyAppArmorInfo adds whether AppArmor is enabled to the info.
- func applyAppArmorInfo(info *SysInfo) {
- if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) {
- if _, err := os.ReadFile("/sys/kernel/security/apparmor/profiles"); err == nil {
- info.AppArmor = true
- }
- }
- }
- // applyCgroupNsInfo adds whether cgroupns is enabled to the info.
- func applyCgroupNsInfo(info *SysInfo) {
- if _, err := os.Stat("/proc/self/ns/cgroup"); !os.IsNotExist(err) {
- info.CgroupNamespaces = true
- }
- }
- // applySeccompInfo checks if Seccomp is supported, via CONFIG_SECCOMP.
- func applySeccompInfo(info *SysInfo) {
- info.Seccomp = seccomp.IsEnabled()
- }
- func cgroupEnabled(mountPoint, name string) bool {
- _, err := os.Stat(path.Join(mountPoint, name))
- return err == nil
- }
- func readProcBool(path string) bool {
- val, err := os.ReadFile(path)
- if err != nil {
- return false
- }
- return strings.TrimSpace(string(val)) == "1"
- }
|