930a9869 |
// +build !windows
package main
import (
"bytes"
"io/ioutil"
"os/exec"
"strings"
"github.com/docker/docker/pkg/parsers/kernel"
"github.com/docker/docker/pkg/sysinfo"
)
var (
// SysInfo stores information about which features a kernel supports.
SysInfo *sysinfo.SysInfo
)
func cpuCfsPeriod() bool { |
b1fb4198 |
return testEnv.DaemonInfo.CPUCfsPeriod |
930a9869 |
}
func cpuCfsQuota() bool { |
b1fb4198 |
return testEnv.DaemonInfo.CPUCfsQuota |
930a9869 |
}
func cpuShare() bool { |
b1fb4198 |
return testEnv.DaemonInfo.CPUShares |
930a9869 |
}
func oomControl() bool { |
b1fb4198 |
return testEnv.DaemonInfo.OomKillDisable |
930a9869 |
}
func pidsLimit() bool {
return SysInfo.PidsLimit
}
func kernelMemorySupport() bool { |
1e1156cf |
// TODO remove this once kmem support in RHEL kernels is fixed. See https://github.com/opencontainers/runc/pull/1921
daemonV, err := kernel.ParseRelease(testEnv.DaemonInfo.KernelVersion)
if err != nil {
return false
}
requiredV := kernel.VersionInfo{Kernel: 3, Major: 10}
if kernel.CompareKernelVersion(*daemonV, requiredV) < 1 {
// On Kernel 3.10 and under, don't consider kernel memory to be supported,
// even if the kernel (and thus the daemon) reports it as being supported
return false
} |
b1fb4198 |
return testEnv.DaemonInfo.KernelMemory |
930a9869 |
}
func memoryLimitSupport() bool { |
b1fb4198 |
return testEnv.DaemonInfo.MemoryLimit |
930a9869 |
}
func memoryReservationSupport() bool {
return SysInfo.MemoryReservation
}
func swapMemorySupport() bool { |
b1fb4198 |
return testEnv.DaemonInfo.SwapLimit |
930a9869 |
}
func memorySwappinessSupport() bool { |
43b15e92 |
return testEnv.IsLocalDaemon() && SysInfo.MemorySwappiness |
930a9869 |
}
func blkioWeight() bool { |
43b15e92 |
return testEnv.IsLocalDaemon() && SysInfo.BlkioWeight |
930a9869 |
}
func cgroupCpuset() bool { |
b1fb4198 |
return testEnv.DaemonInfo.CPUSet |
930a9869 |
}
func seccompEnabled() bool {
return supportsSeccomp && SysInfo.Seccomp
}
func bridgeNfIptables() bool {
return !SysInfo.BridgeNFCallIPTablesDisabled
}
func unprivilegedUsernsClone() bool {
content, err := ioutil.ReadFile("/proc/sys/kernel/unprivileged_userns_clone")
return err != nil || !strings.Contains(string(content), "0")
}
func overlayFSSupported() bool {
cmd := exec.Command(dockerBinary, "run", "--rm", "busybox", "/bin/sh", "-c", "cat /proc/filesystems")
out, err := cmd.CombinedOutput()
if err != nil {
return false
}
return bytes.Contains(out, []byte("overlay\n"))
}
func init() { |
43b15e92 |
if testEnv.IsLocalDaemon() { |
b1fb4198 |
SysInfo = sysinfo.New(true)
} |
930a9869 |
} |