mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
b0b71dbe1c
Reimplement GetCgroupMounts using the github.com/containerd/cgroups and github.com/moby/sys/mountinfo packages. Signed-off-by: Cory Snider <csnider@mirantis.com>
145 lines
3.2 KiB
Go
145 lines
3.2 KiB
Go
package sysinfo // import "github.com/docker/docker/pkg/sysinfo"
|
|
|
|
import (
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
|
|
"github.com/containerd/cgroups"
|
|
cgroupsV2 "github.com/containerd/cgroups/v2"
|
|
"github.com/containerd/containerd/pkg/userns"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func newV2(options ...Opt) *SysInfo {
|
|
sysInfo := &SysInfo{
|
|
CgroupUnified: true,
|
|
cg2GroupPath: "/",
|
|
}
|
|
for _, o := range options {
|
|
o(sysInfo)
|
|
}
|
|
|
|
ops := []infoCollector{
|
|
applyNetworkingInfo,
|
|
applyAppArmorInfo,
|
|
applySeccompInfo,
|
|
applyCgroupNsInfo,
|
|
}
|
|
|
|
m, err := cgroupsV2.LoadManager("/sys/fs/cgroup", sysInfo.cg2GroupPath)
|
|
if err != nil {
|
|
logrus.Warn(err)
|
|
} else {
|
|
sysInfo.cg2Controllers = make(map[string]struct{})
|
|
controllers, err := m.Controllers()
|
|
if err != nil {
|
|
logrus.Warn(err)
|
|
}
|
|
for _, c := range controllers {
|
|
sysInfo.cg2Controllers[c] = struct{}{}
|
|
}
|
|
ops = append(ops,
|
|
applyMemoryCgroupInfoV2,
|
|
applyCPUCgroupInfoV2,
|
|
applyIOCgroupInfoV2,
|
|
applyCPUSetCgroupInfoV2,
|
|
applyPIDSCgroupInfoV2,
|
|
applyDevicesCgroupInfoV2,
|
|
)
|
|
}
|
|
|
|
for _, o := range ops {
|
|
o(sysInfo)
|
|
}
|
|
return sysInfo
|
|
}
|
|
|
|
func getSwapLimitV2() bool {
|
|
groups, err := cgroups.ParseCgroupFile("/proc/self/cgroup")
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
g := groups[""]
|
|
if g == "" {
|
|
return false
|
|
}
|
|
|
|
cGroupPath := path.Join("/sys/fs/cgroup", g, "memory.swap.max")
|
|
if _, err = os.Stat(cGroupPath); os.IsNotExist(err) {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func applyMemoryCgroupInfoV2(info *SysInfo) {
|
|
if _, ok := info.cg2Controllers["memory"]; !ok {
|
|
info.Warnings = append(info.Warnings, "Unable to find memory controller")
|
|
return
|
|
}
|
|
|
|
info.MemoryLimit = true
|
|
info.SwapLimit = getSwapLimitV2()
|
|
info.MemoryReservation = true
|
|
info.OomKillDisable = false
|
|
info.MemorySwappiness = false
|
|
info.KernelMemory = false
|
|
info.KernelMemoryTCP = false
|
|
}
|
|
|
|
func applyCPUCgroupInfoV2(info *SysInfo) {
|
|
if _, ok := info.cg2Controllers["cpu"]; !ok {
|
|
info.Warnings = append(info.Warnings, "Unable to find cpu controller")
|
|
return
|
|
}
|
|
info.CPUShares = true
|
|
info.CPUCfs = true
|
|
info.CPURealtime = false
|
|
}
|
|
|
|
func applyIOCgroupInfoV2(info *SysInfo) {
|
|
if _, ok := info.cg2Controllers["io"]; !ok {
|
|
info.Warnings = append(info.Warnings, "Unable to find io controller")
|
|
return
|
|
}
|
|
|
|
info.BlkioWeight = true
|
|
info.BlkioWeightDevice = true
|
|
info.BlkioReadBpsDevice = true
|
|
info.BlkioWriteBpsDevice = true
|
|
info.BlkioReadIOpsDevice = true
|
|
info.BlkioWriteIOpsDevice = true
|
|
}
|
|
|
|
func applyCPUSetCgroupInfoV2(info *SysInfo) {
|
|
if _, ok := info.cg2Controllers["cpuset"]; !ok {
|
|
info.Warnings = append(info.Warnings, "Unable to find cpuset controller")
|
|
return
|
|
}
|
|
info.Cpuset = true
|
|
|
|
cpus, err := os.ReadFile(path.Join("/sys/fs/cgroup", info.cg2GroupPath, "cpuset.cpus.effective"))
|
|
if err != nil {
|
|
return
|
|
}
|
|
info.Cpus = strings.TrimSpace(string(cpus))
|
|
|
|
mems, err := os.ReadFile(path.Join("/sys/fs/cgroup", info.cg2GroupPath, "cpuset.mems.effective"))
|
|
if err != nil {
|
|
return
|
|
}
|
|
info.Mems = strings.TrimSpace(string(mems))
|
|
}
|
|
|
|
func applyPIDSCgroupInfoV2(info *SysInfo) {
|
|
if _, ok := info.cg2Controllers["pids"]; !ok {
|
|
info.Warnings = append(info.Warnings, "Unable to find pids controller")
|
|
return
|
|
}
|
|
info.PidsLimit = true
|
|
}
|
|
|
|
func applyDevicesCgroupInfoV2(info *SysInfo) {
|
|
info.CgroupDevicesEnabled = !userns.RunningInUserNS()
|
|
}
|