2019-11-12 14:12:37 +00:00
|
|
|
#!/bin/sh
|
2019-11-12 14:09:02 +00:00
|
|
|
set -e
|
|
|
|
|
|
|
|
EXITCODE=0
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
# rancher/k3s modified from
|
|
|
|
# https://github.com/moby/moby/blob/c831882/contrib/check-config.sh
|
|
|
|
|
|
|
|
# bits of this were adapted from lxc-checkconfig for moby
|
2019-11-12 14:09:02 +00:00
|
|
|
# see also https://github.com/lxc/lxc/blob/lxc-1.0.2/src/lxc/lxc-checkconfig.in
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
uname=$(uname -r)
|
|
|
|
possibleConfigs="
|
|
|
|
/proc/config.gz
|
|
|
|
/boot/config-${uname}
|
|
|
|
/boot/config-${uname##*-}
|
|
|
|
/usr/src/linux-${uname}/.config
|
|
|
|
/usr/src/linux/.config
|
|
|
|
"
|
2019-11-13 19:21:56 +00:00
|
|
|
binDir=$(dirname "$0")
|
|
|
|
configFormat=gz
|
2019-11-14 00:08:15 +00:00
|
|
|
isError=0
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
if [ $# -gt 0 ]; then
|
2019-11-12 14:12:37 +00:00
|
|
|
CONFIG="$1"
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
2023-07-12 15:49:05 +00:00
|
|
|
if ! command -v zgrep >/dev/null 2>&1 || eval "cat /sys/kernel/security/apparmor/profiles | grep -q 'zgrep (enforce)'"; then
|
2019-11-12 14:12:37 +00:00
|
|
|
zgrep() {
|
|
|
|
zcat "$2" | grep "$1"
|
|
|
|
}
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
dogrep() {
|
|
|
|
if [ "$configFormat" = "gz" ]; then
|
|
|
|
zgrep "$1" "$2"
|
|
|
|
else
|
|
|
|
grep "$1" "$2"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-11-12 14:09:02 +00:00
|
|
|
kernelVersion="$(uname -r)"
|
|
|
|
kernelMajor="${kernelVersion%%.*}"
|
|
|
|
kernelMinor="${kernelVersion#$kernelMajor.}"
|
|
|
|
kernelMinor="${kernelMinor%%.*}"
|
|
|
|
|
|
|
|
is_set() {
|
2019-11-12 14:12:37 +00:00
|
|
|
dogrep "CONFIG_$1=[y|m]" "$CONFIG" > /dev/null
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
is_set_in_kernel() {
|
2019-11-12 14:12:37 +00:00
|
|
|
dogrep "CONFIG_$1=y" "$CONFIG" > /dev/null
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
is_set_as_module() {
|
2019-11-12 14:12:37 +00:00
|
|
|
dogrep "CONFIG_$1=m" "$CONFIG" > /dev/null
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
color() {
|
2024-02-29 11:26:32 +00:00
|
|
|
if [[ -n "$NO_COLOR" ]]; then
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
codes=
|
|
|
|
if [ "$1" = 'bold' ]; then
|
|
|
|
codes=1
|
|
|
|
shift
|
|
|
|
fi
|
|
|
|
if [ "$#" -gt 0 ]; then
|
|
|
|
code=
|
|
|
|
case "$1" in
|
|
|
|
# see https://en.wikipedia.org/wiki/ANSI_escape_code#Colors
|
|
|
|
black) code=30 ;;
|
|
|
|
red) code=31 ;;
|
|
|
|
green) code=32 ;;
|
|
|
|
yellow) code=33 ;;
|
|
|
|
blue) code=34 ;;
|
|
|
|
magenta) code=35 ;;
|
|
|
|
cyan) code=36 ;;
|
|
|
|
white) code=37 ;;
|
|
|
|
esac
|
|
|
|
if [ "$code" ]; then
|
|
|
|
[ "$codes" ] && codes="${codes};"
|
|
|
|
codes="${codes}${code}"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
printf '\033['"$codes"'m'
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
wrap_color() {
|
2019-11-12 14:12:37 +00:00
|
|
|
text="$1"
|
|
|
|
shift
|
|
|
|
color "$@"
|
|
|
|
echo -n "$text"
|
|
|
|
color reset
|
|
|
|
echo
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
wrap_good() {
|
2019-11-12 14:12:37 +00:00
|
|
|
echo "$(wrap_color "$1" white): $(wrap_color "$2" green)"
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
wrap_bad() {
|
2019-11-13 21:57:58 +00:00
|
|
|
echo "$(wrap_color "$1" bold): $(wrap_color "$2 (fail)" bold red)"
|
|
|
|
EXITCODE=$(($EXITCODE+1))
|
2019-11-12 14:12:37 +00:00
|
|
|
}
|
|
|
|
wrap_warn() {
|
|
|
|
echo "$(wrap_color "$1" bold): $(wrap_color "$2" bold yellow)"
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
2019-11-12 14:12:37 +00:00
|
|
|
warning() {
|
|
|
|
wrap_color >&2 "$*" yellow
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_flag() {
|
2019-11-12 14:12:37 +00:00
|
|
|
if is_set_in_kernel "$1"; then
|
|
|
|
wrap_good "CONFIG_$1" 'enabled'
|
|
|
|
elif is_set_as_module "$1"; then
|
|
|
|
wrap_good "CONFIG_$1" 'enabled (as module)'
|
|
|
|
else
|
2019-11-14 00:08:15 +00:00
|
|
|
if [ $isError -eq 1 ]; then
|
2019-11-12 14:12:37 +00:00
|
|
|
wrap_bad "CONFIG_$1" 'missing'
|
|
|
|
else
|
|
|
|
wrap_warn "CONFIG_$1" 'missing'
|
|
|
|
fi
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_flags() {
|
2019-11-12 14:12:37 +00:00
|
|
|
for flag in "$@"; do
|
|
|
|
echo -n "- "; check_flag "$flag"
|
|
|
|
done
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_command() {
|
2019-11-12 14:12:37 +00:00
|
|
|
if command -v "$1" >/dev/null 2>&1; then
|
|
|
|
wrap_good "$1 command" 'available'
|
|
|
|
else
|
|
|
|
wrap_bad "$1 command" 'missing'
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_device() {
|
2019-11-12 14:12:37 +00:00
|
|
|
if [ -c "$1" ]; then
|
|
|
|
wrap_good "$1" 'present'
|
|
|
|
else
|
|
|
|
wrap_bad "$1" 'missing'
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_distro_userns() {
|
2019-11-12 14:12:37 +00:00
|
|
|
[ -s /etc/os-release ] || return 0
|
|
|
|
source /etc/os-release 2>/dev/null || true
|
|
|
|
if ( echo "${ID}" | grep -q -E '^(centos|rhel)$' ) && \
|
|
|
|
( echo "${VERSION_ID}" | grep -q -E '^7' ); then
|
|
|
|
# this is a CentOS7 or RHEL7 system
|
|
|
|
if ! grep -q "user_namespace.enable=1" /proc/cmdline; then
|
|
|
|
# no user namespace support enabled
|
|
|
|
wrap_bad " (RHEL7/CentOS7" "User namespaces disabled; add 'user_namespace.enable=1' to boot command line)"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ---
|
|
|
|
|
|
|
|
echo
|
|
|
|
|
|
|
|
{
|
2019-11-13 19:21:56 +00:00
|
|
|
cd $binDir
|
|
|
|
echo "Verifying binaries in $binDir:"
|
2019-11-12 14:12:37 +00:00
|
|
|
|
|
|
|
if [ -s .sha256sums ]; then
|
|
|
|
sumsTemp=$(mktemp)
|
|
|
|
if sha256sum -c .sha256sums >$sumsTemp 2>&1; then
|
|
|
|
wrap_good '- sha256sum' 'good'
|
|
|
|
else
|
|
|
|
wrap_bad '- sha256sum' 'does not match'
|
2019-11-13 19:21:56 +00:00
|
|
|
cat $sumsTemp | sed 's/^/ ... /'
|
2019-11-12 14:12:37 +00:00
|
|
|
fi
|
|
|
|
rm -f $sumsTemp
|
|
|
|
else
|
|
|
|
wrap_warn '- sha256sum' 'sha256sums unavailable'
|
|
|
|
fi
|
|
|
|
|
|
|
|
linkFail=0
|
|
|
|
if [ -s .links ]; then
|
|
|
|
while read file link; do
|
|
|
|
if [ "$(readlink $file)" != "$link" ]; then
|
2023-03-29 16:55:08 +00:00
|
|
|
# If no iptables is installed on the host system, the symlink will be different
|
|
|
|
if [ "$(readlink $file)" = "xtables-legacy-multi" ]; then
|
|
|
|
wrap_warn "- $file" "symlink to xtables-legacy-multi"
|
|
|
|
elif [ "$(readlink $file)" = "xtables-nft-multi" ]; then
|
|
|
|
wrap_warn "- $file" "symlink to xtables-nft-multi"
|
|
|
|
else
|
|
|
|
wrap_bad "- $file" "symlink to $link"
|
|
|
|
linkFail=1
|
|
|
|
fi
|
2019-11-12 14:12:37 +00:00
|
|
|
fi
|
|
|
|
done <.links
|
|
|
|
if [ $linkFail -eq 0 ]; then
|
|
|
|
wrap_good '- links' 'good'
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
wrap_warn '- links' 'link list unavailable'
|
|
|
|
fi
|
|
|
|
|
|
|
|
cd - >/dev/null
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
echo
|
|
|
|
|
|
|
|
{
|
|
|
|
version_ge() {
|
|
|
|
[ "$1" = "$2" ] || [ "$(printf '%s\n' "$@" | sort -V | head -n 1)" != "$1" ]
|
|
|
|
}
|
2021-06-10 17:47:03 +00:00
|
|
|
version_less() {
|
|
|
|
[ "$(printf '%s\n' "$@" | sort -rV | head -n 1)" != "$1" ]
|
|
|
|
}
|
2019-11-13 19:21:56 +00:00
|
|
|
which_iptables() {
|
|
|
|
(
|
|
|
|
localIPtables=$(command -v iptables)
|
|
|
|
PATH=$(printf "%s" "$(echo -n $PATH | tr ":" "\n" | grep -v -E "^$binDir$")" | tr "\n" ":")
|
|
|
|
systemIPtables=$(command -v iptables)
|
|
|
|
if [ -n "$systemIPtables" ]; then
|
|
|
|
echo $systemIPtables
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
echo $localIPtables
|
|
|
|
)
|
|
|
|
}
|
2019-11-12 14:12:37 +00:00
|
|
|
|
|
|
|
echo "System:"
|
2019-11-13 19:21:56 +00:00
|
|
|
|
|
|
|
iptablesCmd=$(which_iptables)
|
|
|
|
iptablesVersion=
|
|
|
|
if [ "$iptablesCmd" ]; then
|
|
|
|
iptablesInfo=$($iptablesCmd --version 2>/dev/null) || true
|
|
|
|
iptablesVersion=$(echo $iptablesInfo | awk '{ print $2 }')
|
|
|
|
label="$(dirname $iptablesCmd) $iptablesInfo"
|
|
|
|
fi
|
|
|
|
if echo "$iptablesVersion" | grep -v -q -E '^v[0-9]'; then
|
|
|
|
[ "$iptablesCmd" ] || iptablesCmd="unknown iptables"
|
|
|
|
wrap_warn "- $iptablesCmd" "unknown version: $iptablesInfo"
|
|
|
|
elif version_ge $iptablesVersion v1.8.0; then
|
2019-11-12 14:12:37 +00:00
|
|
|
iptablesMode=$(echo $iptablesInfo | awk '{ print $3 }')
|
2021-06-10 17:47:03 +00:00
|
|
|
if [ "$iptablesMode" != "(legacy)" ] && version_less $iptablesVersion v1.8.4; then
|
|
|
|
wrap_bad "- $label" 'should be older than v1.8.0, newer than v1.8.3, or in legacy mode'
|
2019-11-12 14:12:37 +00:00
|
|
|
else
|
2019-11-13 19:21:56 +00:00
|
|
|
wrap_good "- $label" 'ok'
|
2019-11-12 14:12:37 +00:00
|
|
|
fi
|
|
|
|
else
|
2019-11-13 19:21:56 +00:00
|
|
|
wrap_good "- $label" 'older than v1.8'
|
2019-11-12 14:12:37 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
totalSwap=$(free | grep -i '^swap:' | awk '{ print $2 }')
|
|
|
|
if [ "$totalSwap" != "0" ]; then
|
|
|
|
wrap_warn '- swap' 'should be disabled'
|
|
|
|
else
|
|
|
|
wrap_good '- swap' 'disabled'
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ip route | grep -v cni0 | grep -q -E '^10\.(42|43)\.'; then
|
|
|
|
wrap_warn '- routes' 'default CIDRs 10.42.0.0/16 or 10.43.0.0/16 already routed'
|
|
|
|
else
|
|
|
|
wrap_good '- routes' 'ok'
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
echo
|
|
|
|
|
|
|
|
{
|
|
|
|
check_limit_over()
|
|
|
|
{
|
|
|
|
if [ "$(cat "$1")" -le "$2" ]; then
|
|
|
|
wrap_bad "- $1" "$(cat "$1")"
|
|
|
|
wrap_color " This should be set to at least $2, for example set: sysctl -w kernel/keys/root_maxkeys=1000000" bold black
|
|
|
|
else
|
|
|
|
wrap_good "- $1" "$(cat "$1")"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
echo 'Limits:'
|
|
|
|
check_limit_over /proc/sys/kernel/keys/root_maxkeys 10000
|
|
|
|
}
|
|
|
|
|
|
|
|
echo
|
|
|
|
|
|
|
|
# ---
|
|
|
|
|
|
|
|
SUDO=
|
|
|
|
[ $(id -u) -ne 0 ] && SUDO=sudo
|
2019-11-14 17:56:37 +00:00
|
|
|
lsmod | grep -q configs || $SUDO modprobe configs || true
|
2019-11-12 14:12:37 +00:00
|
|
|
|
|
|
|
if [ -z "$CONFIG" ]; then
|
|
|
|
for tryConfig in ${possibleConfigs}; do
|
|
|
|
if [ -e "$tryConfig" ]; then
|
|
|
|
CONFIG="$tryConfig"
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
if [ ! -e "$CONFIG" ]; then
|
2019-11-12 14:12:37 +00:00
|
|
|
case "$CONFIG" in
|
|
|
|
-*)
|
|
|
|
warning "error: argument $CONFIG"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
warning "error: cannot find kernel config $CONFIG"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
warning " try running this script again, specifying the kernel config:"
|
|
|
|
warning " set CONFIG=/path/to/kernel/.config or add argument /path/to/kernel/.config"
|
|
|
|
exit 1
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
wrap_color "info: reading kernel config from $CONFIG ..." cyan
|
|
|
|
zcat $CONFIG >/dev/null 2>&1 || configFormat=
|
|
|
|
|
2019-11-12 14:09:02 +00:00
|
|
|
echo
|
|
|
|
|
|
|
|
echo 'Generally Necessary:'
|
|
|
|
|
2021-04-25 18:49:53 +00:00
|
|
|
cgroupV2FsType='63677270'
|
|
|
|
cgroupFsType="$(stat --file-system --format=%t /sys/fs/cgroup 2>/dev/null || :)"
|
|
|
|
cgroupHybridFsType="$(stat --file-system --format=%t /sys/fs/cgroup/unified 2>/dev/null || :)"
|
|
|
|
|
2019-11-12 14:09:02 +00:00
|
|
|
echo -n '- '
|
2021-04-25 18:49:53 +00:00
|
|
|
case "${cgroupFsType}:${cgroupHybridFsType}" in
|
|
|
|
'':*)
|
|
|
|
cgroupVariant='Nonexistent'
|
|
|
|
;;
|
|
|
|
${cgroupV2FsType}:*)
|
|
|
|
cgroupVariant='V2'
|
|
|
|
;;
|
|
|
|
*:${cgroupV2FsType})
|
|
|
|
cgroupVariant='Hybrid'
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
cgroupVariant='V1'
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
case "${cgroupVariant}" in
|
|
|
|
Nonexistent)
|
|
|
|
wrap_bad 'cgroup hierarchy' "cgroups ${cgroupVariant}"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
case "${cgroupVariant}" in
|
|
|
|
V2)
|
|
|
|
cgroupMatch='cpu|cpuset|memory'
|
|
|
|
cgroupMatchNum=3
|
|
|
|
cgroupFile='/sys/fs/cgroup/cgroup.controllers'
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
cgroupMatch='cpuset|memory'
|
|
|
|
cgroupMatchNum=2
|
|
|
|
cgroupFile='/proc/self/cgroup'
|
|
|
|
;;
|
|
|
|
esac
|
2021-09-17 17:04:19 +00:00
|
|
|
if [ "$(tr -s ' ' '\n' <"${cgroupFile}" 2>/dev/null | grep -Ec "(^|:)(${cgroupMatch})(\$|:)")" -eq ${cgroupMatchNum} ]; then
|
2021-04-25 18:49:53 +00:00
|
|
|
cgroupStatus='good'
|
|
|
|
else
|
|
|
|
cgroupStatus='bad'
|
|
|
|
fi
|
|
|
|
wrap_${cgroupStatus} 'cgroup hierarchy' "cgroups ${cgroupVariant} mounted, ${cgroupMatch} controllers status: ${cgroupStatus}"
|
|
|
|
if [ "x${cgroupStatus}" = 'xbad' ]; then
|
|
|
|
warning ' (for cgroups V1/Hybrid on non-Systemd init see https://github.com/tianon/cgroupfs-mount)'
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
if [ "$(cat /sys/module/apparmor/parameters/enabled 2>/dev/null)" = 'Y' ]; then
|
2019-11-12 14:12:37 +00:00
|
|
|
echo -n '- '
|
|
|
|
if command -v apparmor_parser &> /dev/null; then
|
|
|
|
wrap_good 'apparmor' 'enabled and tools installed'
|
|
|
|
else
|
|
|
|
wrap_bad 'apparmor' 'enabled, but apparmor_parser missing'
|
|
|
|
echo -n ' '
|
|
|
|
if command -v apt-get &> /dev/null; then
|
|
|
|
wrap_color '(use "apt-get install apparmor" to fix this)'
|
|
|
|
elif command -v yum &> /dev/null; then
|
|
|
|
wrap_color '(your best bet is "yum install apparmor-parser")'
|
2022-10-26 15:38:18 +00:00
|
|
|
elif command -v zypper &> /dev/null; then
|
|
|
|
wrap_color '(your best bet is "zypper install apparmor-parser")'
|
2019-11-12 14:12:37 +00:00
|
|
|
else
|
|
|
|
wrap_color '(look for an "apparmor" package for your distribution)'
|
|
|
|
fi
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
flags="
|
|
|
|
NAMESPACES NET_NS PID_NS IPC_NS UTS_NS
|
2023-03-29 16:55:08 +00:00
|
|
|
CGROUPS CGROUP_PIDS CGROUP_CPUACCT CGROUP_DEVICE CGROUP_FREEZER CGROUP_SCHED CPUSETS MEMCG
|
2019-11-12 14:12:37 +00:00
|
|
|
KEYS
|
|
|
|
VETH BRIDGE BRIDGE_NETFILTER
|
2020-10-06 21:25:32 +00:00
|
|
|
IP_NF_FILTER IP_NF_TARGET_MASQUERADE
|
2023-03-14 16:55:38 +00:00
|
|
|
NETFILTER_XT_MATCH_ADDRTYPE NETFILTER_XT_MATCH_CONNTRACK NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_MULTIPORT
|
2020-10-06 21:25:32 +00:00
|
|
|
IP_NF_NAT NF_NAT
|
2019-11-12 14:12:37 +00:00
|
|
|
POSIX_MQUEUE
|
|
|
|
"
|
2019-11-14 00:08:15 +00:00
|
|
|
isError=1 check_flags $flags && isError=0
|
|
|
|
|
2019-11-12 14:09:02 +00:00
|
|
|
if [ "$kernelMajor" -lt 4 ] || ( [ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -lt 8 ] ); then
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags DEVPTS_MULTIPLE_INSTANCES
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo
|
|
|
|
|
|
|
|
echo 'Optional Features:'
|
|
|
|
{
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags USER_NS
|
|
|
|
check_distro_userns
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
|
|
|
{
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags SECCOMP
|
2019-11-12 14:09:02 +00:00
|
|
|
}
|
2019-11-12 14:12:37 +00:00
|
|
|
# {
|
|
|
|
# check_flags MEMCG_SWAP MEMCG_SWAP_ENABLED
|
|
|
|
# if [ -e /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes ]; then
|
|
|
|
# echo " $(wrap_color '(cgroup swap accounting is currently enabled)' bold black)"
|
|
|
|
# elif is_set MEMCG_SWAP && ! is_set MEMCG_SWAP_ENABLED; then
|
|
|
|
# echo " $(wrap_color '(cgroup swap accounting is currently not enabled, you can enable it by setting boot option "swapaccount=1")' bold black)"
|
|
|
|
# fi
|
|
|
|
# }
|
|
|
|
# {
|
|
|
|
# if is_set LEGACY_VSYSCALL_NATIVE; then
|
|
|
|
# echo -n "- "; wrap_bad "CONFIG_LEGACY_VSYSCALL_NATIVE" 'enabled'
|
|
|
|
# echo " $(wrap_color '(dangerous, provides an ASLR-bypassing target with usable ROP gadgets.)' bold black)"
|
|
|
|
# elif is_set LEGACY_VSYSCALL_EMULATE; then
|
|
|
|
# echo -n "- "; wrap_good "CONFIG_LEGACY_VSYSCALL_EMULATE" 'enabled'
|
|
|
|
# elif is_set LEGACY_VSYSCALL_NONE; then
|
|
|
|
# echo -n "- "; wrap_bad "CONFIG_LEGACY_VSYSCALL_NONE" 'enabled'
|
|
|
|
# echo " $(wrap_color '(containers using eglibc <= 2.13 will not work. Switch to' bold black)"
|
|
|
|
# echo " $(wrap_color ' "CONFIG_VSYSCALL_[NATIVE|EMULATE]" or use "vsyscall=[native|emulate]"' bold black)"
|
|
|
|
# echo " $(wrap_color ' on kernel command line. Note that this will disable ASLR for the,' bold black)"
|
|
|
|
# echo " $(wrap_color ' VDSO which may assist in exploiting security vulnerabilities.)' bold black)"
|
|
|
|
# # else Older kernels (prior to 3dc33bd30f3e, released in v4.40-rc1) do
|
|
|
|
# # not have these LEGACY_VSYSCALL options and are effectively
|
|
|
|
# # LEGACY_VSYSCALL_EMULATE. Even older kernels are presumably
|
|
|
|
# # effectively LEGACY_VSYSCALL_NATIVE.
|
|
|
|
# fi
|
|
|
|
# }
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
if [ "$kernelMajor" -lt 4 ] || ( [ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -le 5 ] ); then
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags MEMCG_KMEM
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "$kernelMajor" -lt 3 ] || ( [ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 18 ] ); then
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags RESOURCE_COUNTERS
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "$kernelMajor" -lt 3 ] || ( [ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 13 ] ); then
|
2019-11-12 14:12:37 +00:00
|
|
|
netprio=NETPRIO_CGROUP
|
2019-11-12 14:09:02 +00:00
|
|
|
else
|
2019-11-12 14:12:37 +00:00
|
|
|
netprio=CGROUP_NET_PRIO
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
# IOSCHED_CFQ CFQ_GROUP_IOSCHED
|
|
|
|
flags="
|
2020-05-27 15:27:30 +00:00
|
|
|
BLK_CGROUP BLK_DEV_THROTTLING
|
2019-11-12 14:12:37 +00:00
|
|
|
CGROUP_PERF
|
|
|
|
CGROUP_HUGETLB
|
|
|
|
NET_CLS_CGROUP $netprio
|
|
|
|
CFS_BANDWIDTH FAIR_GROUP_SCHED RT_GROUP_SCHED
|
|
|
|
IP_NF_TARGET_REDIRECT
|
2020-01-14 19:53:51 +00:00
|
|
|
IP_SET
|
2019-11-12 14:12:37 +00:00
|
|
|
IP_VS
|
|
|
|
IP_VS_NFCT
|
|
|
|
IP_VS_PROTO_TCP
|
|
|
|
IP_VS_PROTO_UDP
|
2020-01-14 19:53:51 +00:00
|
|
|
IP_VS_RR
|
2019-11-12 14:12:37 +00:00
|
|
|
"
|
|
|
|
check_flags $flags
|
|
|
|
|
|
|
|
# if ! is_set EXT4_USE_FOR_EXT2; then
|
|
|
|
# check_flags EXT3_FS EXT3_FS_XATTR EXT3_FS_POSIX_ACL EXT3_FS_SECURITY
|
|
|
|
# if ! is_set EXT3_FS || ! is_set EXT3_FS_XATTR || ! is_set EXT3_FS_POSIX_ACL || ! is_set EXT3_FS_SECURITY; then
|
|
|
|
# echo " $(wrap_color '(enable these ext3 configs if you are using ext3 as backing filesystem)' bold black)"
|
|
|
|
# fi
|
|
|
|
# fi
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
check_flags EXT4_FS EXT4_FS_POSIX_ACL EXT4_FS_SECURITY
|
|
|
|
if ! is_set EXT4_FS || ! is_set EXT4_FS_POSIX_ACL || ! is_set EXT4_FS_SECURITY; then
|
2019-11-12 14:12:37 +00:00
|
|
|
if is_set EXT4_USE_FOR_EXT2; then
|
|
|
|
echo " $(wrap_color 'enable these ext4 configs if you are using ext3 or ext4 as backing filesystem' bold black)"
|
|
|
|
else
|
|
|
|
echo " $(wrap_color 'enable these ext4 configs if you are using ext4 as backing filesystem' bold black)"
|
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo '- Network Drivers:'
|
|
|
|
echo " - \"$(wrap_color 'overlay' blue)\":"
|
2019-11-12 14:12:37 +00:00
|
|
|
check_flags VXLAN | sed 's/^/ /' # BRIDGE_VLAN_FILTERING
|
2019-11-12 14:09:02 +00:00
|
|
|
echo ' Optional (for encrypted networks):'
|
|
|
|
check_flags CRYPTO CRYPTO_AEAD CRYPTO_GCM CRYPTO_SEQIV CRYPTO_GHASH \
|
|
|
|
XFRM XFRM_USER XFRM_ALGO INET_ESP INET_XFRM_MODE_TRANSPORT | sed 's/^/ /'
|
2019-11-12 14:12:37 +00:00
|
|
|
# echo " - \"$(wrap_color 'ipvlan' blue)\":"
|
|
|
|
# check_flags IPVLAN | sed 's/^/ /'
|
|
|
|
# echo " - \"$(wrap_color 'macvlan' blue)\":"
|
|
|
|
# check_flags MACVLAN DUMMY | sed 's/^/ /'
|
|
|
|
# echo " - \"$(wrap_color 'ftp,tftp client in container' blue)\":"
|
|
|
|
# check_flags NF_NAT_FTP NF_CONNTRACK_FTP NF_NAT_TFTP NF_CONNTRACK_TFTP | sed 's/^/ /'
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
echo '- Storage Drivers:'
|
|
|
|
echo " - \"$(wrap_color 'overlay' blue)\":"
|
|
|
|
check_flags OVERLAY_FS | sed 's/^/ /'
|
|
|
|
|
2019-11-12 14:12:37 +00:00
|
|
|
# ---
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
echo
|
2019-11-12 14:12:37 +00:00
|
|
|
if [ $EXITCODE -eq 0 ]; then
|
|
|
|
wrap_good 'STATUS' 'pass'
|
|
|
|
else
|
2019-11-13 21:57:58 +00:00
|
|
|
wrap_bad 'STATUS' $EXITCODE
|
2019-11-12 14:12:37 +00:00
|
|
|
fi
|
2019-11-12 14:09:02 +00:00
|
|
|
|
|
|
|
exit $EXITCODE
|