github.com/moby/docker@v26.1.3+incompatible/contrib/check-config.sh (about) 1 #!/usr/bin/env sh 2 set -e 3 4 EXITCODE=0 5 6 # bits of this were adapted from lxc-checkconfig 7 # see also https://github.com/lxc/lxc/blob/lxc-1.0.2/src/lxc/lxc-checkconfig.in 8 9 possibleConfigs=" 10 /proc/config.gz 11 /boot/config-$(uname -r) 12 /usr/src/linux-$(uname -r)/.config 13 /usr/src/linux/.config 14 " 15 16 if [ $# -gt 0 ]; then 17 CONFIG="$1" 18 else 19 : "${CONFIG:=/proc/config.gz}" 20 fi 21 22 if ! command -v zgrep > /dev/null 2>&1; then 23 zgrep() { 24 zcat "$2" | grep "$1" 25 } 26 fi 27 28 useColor=true 29 if [ "$NO_COLOR" = "1" ] || [ ! -t 1 ]; then 30 useColor=false 31 fi 32 kernelVersion="$(uname -r)" 33 kernelMajor="${kernelVersion%%.*}" 34 kernelMinor="${kernelVersion#$kernelMajor.}" 35 kernelMinor="${kernelMinor%%.*}" 36 37 is_set() { 38 zgrep "CONFIG_$1=[y|m]" "$CONFIG" > /dev/null 39 } 40 is_set_in_kernel() { 41 zgrep "CONFIG_$1=y" "$CONFIG" > /dev/null 42 } 43 is_set_as_module() { 44 zgrep "CONFIG_$1=m" "$CONFIG" > /dev/null 45 } 46 47 color() { 48 # if stdout is not a terminal, then don't do color codes. 49 if [ "$useColor" = "false" ]; then 50 return 0 51 fi 52 codes= 53 if [ "$1" = 'bold' ]; then 54 codes='1' 55 shift 56 fi 57 if [ "$#" -gt 0 ]; then 58 code= 59 case "$1" in 60 # see https://en.wikipedia.org/wiki/ANSI_escape_code#Colors 61 black) code=30 ;; 62 red) code=31 ;; 63 green) code=32 ;; 64 yellow) code=33 ;; 65 blue) code=34 ;; 66 magenta) code=35 ;; 67 cyan) code=36 ;; 68 white) code=37 ;; 69 esac 70 if [ "$code" ]; then 71 codes="${codes:+$codes;}$code" 72 fi 73 fi 74 printf '\033[%sm' "$codes" 75 } 76 wrap_color() { 77 text="$1" 78 shift 79 color "$@" 80 printf '%s' "$text" 81 color reset 82 echo 83 } 84 85 wrap_good() { 86 echo "$(wrap_color "$1" white): $(wrap_color "$2" green)" 87 } 88 wrap_bad() { 89 echo "$(wrap_color "$1" bold): $(wrap_color "$2" bold red)" 90 } 91 wrap_warning() { 92 wrap_color >&2 "$*" red 93 } 94 95 check_flag() { 96 if is_set_in_kernel "$1"; then 97 wrap_good "CONFIG_$1" 'enabled' 98 elif is_set_as_module "$1"; then 99 wrap_good "CONFIG_$1" 'enabled (as module)' 100 else 101 wrap_bad "CONFIG_$1" 'missing' 102 EXITCODE=1 103 fi 104 } 105 106 check_flags() { 107 for flag in "$@"; do 108 printf -- '- ' 109 check_flag "$flag" 110 done 111 } 112 113 check_command() { 114 if command -v "$1" > /dev/null 2>&1; then 115 wrap_good "$1 command" 'available' 116 else 117 wrap_bad "$1 command" 'missing' 118 EXITCODE=1 119 fi 120 } 121 122 check_device() { 123 if [ -c "$1" ]; then 124 wrap_good "$1" 'present' 125 else 126 wrap_bad "$1" 'missing' 127 EXITCODE=1 128 fi 129 } 130 131 check_distro_userns() { 132 if [ ! -e /etc/os-release ]; then 133 return 134 fi 135 . /etc/os-release 2> /dev/null || /bin/true 136 case "$ID" in 137 centos | rhel) 138 case "$VERSION_ID" in 139 7*) 140 # this is a CentOS7 or RHEL7 system 141 grep -q 'user_namespace.enable=1' /proc/cmdline || { 142 # no user namespace support enabled 143 wrap_bad " (RHEL7/CentOS7" "User namespaces disabled; add 'user_namespace.enable=1' to boot command line)" 144 EXITCODE=1 145 } 146 ;; 147 esac 148 ;; 149 esac 150 } 151 152 if [ ! -e "$CONFIG" ]; then 153 wrap_warning "warning: $CONFIG does not exist, searching other paths for kernel config ..." 154 for tryConfig in $possibleConfigs; do 155 if [ -e "$tryConfig" ]; then 156 CONFIG="$tryConfig" 157 break 158 fi 159 done 160 if [ ! -e "$CONFIG" ]; then 161 wrap_warning "error: cannot find kernel config" 162 wrap_warning " try running this script again, specifying the kernel config:" 163 wrap_warning " CONFIG=/path/to/kernel/.config $0 or $0 /path/to/kernel/.config" 164 exit 1 165 fi 166 fi 167 168 wrap_color "info: reading kernel config from $CONFIG ..." white 169 echo 170 171 echo 'Generally Necessary:' 172 173 printf -- '- ' 174 if [ "$(stat -f -c %t /sys/fs/cgroup 2> /dev/null)" = '63677270' ]; then 175 wrap_good 'cgroup hierarchy' 'cgroupv2' 176 cgroupv2ControllerFile='/sys/fs/cgroup/cgroup.controllers' 177 if [ -f "$cgroupv2ControllerFile" ]; then 178 echo ' Controllers:' 179 for controller in cpu cpuset io memory pids; do 180 if grep -qE '(^| )'"$controller"'($| )' "$cgroupv2ControllerFile"; then 181 echo " - $(wrap_good "$controller" 'available')" 182 else 183 echo " - $(wrap_bad "$controller" 'missing')" 184 fi 185 done 186 else 187 wrap_bad "$cgroupv2ControllerFile" 'nonexistent??' 188 fi 189 # TODO find an efficient way to check if cgroup.freeze exists in subdir 190 else 191 cgroupSubsystemDir="$(sed -rne '/^[^ ]+ ([^ ]+) cgroup ([^ ]*,)?(cpu|cpuacct|cpuset|devices|freezer|memory)[, ].*$/ { s//\1/p; q }' /proc/mounts)" 192 cgroupDir="$(dirname "$cgroupSubsystemDir")" 193 if [ -d "$cgroupDir/cpu" ] || [ -d "$cgroupDir/cpuacct" ] || [ -d "$cgroupDir/cpuset" ] || [ -d "$cgroupDir/devices" ] || [ -d "$cgroupDir/freezer" ] || [ -d "$cgroupDir/memory" ]; then 194 echo "$(wrap_good 'cgroup hierarchy' 'properly mounted') [$cgroupDir]" 195 else 196 if [ "$cgroupSubsystemDir" ]; then 197 echo "$(wrap_bad 'cgroup hierarchy' 'single mountpoint!') [$cgroupSubsystemDir]" 198 else 199 wrap_bad 'cgroup hierarchy' 'nonexistent??' 200 fi 201 EXITCODE=1 202 echo " $(wrap_color '(see https://github.com/tianon/cgroupfs-mount)' yellow)" 203 fi 204 fi 205 206 if [ "$(cat /sys/module/apparmor/parameters/enabled 2> /dev/null)" = 'Y' ]; then 207 printf -- '- ' 208 if command -v apparmor_parser > /dev/null 2>&1; then 209 wrap_good 'apparmor' 'enabled and tools installed' 210 else 211 wrap_bad 'apparmor' 'enabled, but apparmor_parser missing' 212 printf ' ' 213 if command -v apt-get > /dev/null 2>&1; then 214 wrap_color '(use "apt-get install apparmor" to fix this)' 215 elif command -v yum > /dev/null 2>&1; then 216 wrap_color '(your best bet is "yum install apparmor-parser")' 217 else 218 wrap_color '(look for an "apparmor" package for your distribution)' 219 fi 220 EXITCODE=1 221 fi 222 fi 223 224 check_flags \ 225 NAMESPACES NET_NS PID_NS IPC_NS UTS_NS \ 226 CGROUPS CGROUP_CPUACCT CGROUP_DEVICE CGROUP_FREEZER CGROUP_SCHED CPUSETS MEMCG \ 227 KEYS \ 228 VETH BRIDGE BRIDGE_NETFILTER \ 229 IP_NF_FILTER IP_NF_MANGLE IP_NF_TARGET_MASQUERADE \ 230 NETFILTER_XT_MATCH_ADDRTYPE \ 231 NETFILTER_XT_MATCH_CONNTRACK \ 232 NETFILTER_XT_MATCH_IPVS \ 233 NETFILTER_XT_MARK \ 234 IP_NF_NAT NF_NAT \ 235 POSIX_MQUEUE 236 # (POSIX_MQUEUE is required for bind-mounting /dev/mqueue into containers) 237 238 if [ "$kernelMajor" -lt 4 ] || ([ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -lt 8 ]); then 239 check_flags DEVPTS_MULTIPLE_INSTANCES 240 fi 241 242 if [ "$kernelMajor" -lt 5 ] || [ "$kernelMajor" -eq 5 -a "$kernelMinor" -le 1 ]; then 243 check_flags NF_NAT_IPV4 244 fi 245 246 if [ "$kernelMajor" -lt 5 ] || [ "$kernelMajor" -eq 5 -a "$kernelMinor" -le 2 ]; then 247 check_flags NF_NAT_NEEDED 248 fi 249 # check availability of BPF_CGROUP_DEVICE support 250 if [ "$kernelMajor" -ge 5 ] || ([ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -ge 15 ]); then 251 check_flags CGROUP_BPF 252 fi 253 254 echo 255 256 echo 'Optional Features:' 257 { 258 check_flags USER_NS 259 check_distro_userns 260 } 261 { 262 check_flags SECCOMP 263 check_flags SECCOMP_FILTER 264 } 265 { 266 check_flags CGROUP_PIDS 267 } 268 { 269 check_flags MEMCG_SWAP 270 # Kernel v5.8+ removes MEMCG_SWAP_ENABLED. 271 if [ "$kernelMajor" -lt 5 ] || [ "$kernelMajor" -eq 5 -a "$kernelMinor" -le 8 ]; then 272 CODE=${EXITCODE} 273 check_flags MEMCG_SWAP_ENABLED 274 # FIXME this check is cgroupv1-specific 275 if [ -e /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes ]; then 276 echo " $(wrap_color '(cgroup swap accounting is currently enabled)' bold black)" 277 EXITCODE=${CODE} 278 elif is_set MEMCG_SWAP && ! is_set MEMCG_SWAP_ENABLED; then 279 echo " $(wrap_color '(cgroup swap accounting is currently not enabled, you can enable it by setting boot option "swapaccount=1")' bold black)" 280 fi 281 else 282 # Kernel v5.8+ enables swap accounting by default. 283 echo " $(wrap_color '(cgroup swap accounting is currently enabled)' bold black)" 284 fi 285 } 286 { 287 if is_set LEGACY_VSYSCALL_NATIVE; then 288 printf -- '- ' 289 wrap_bad "CONFIG_LEGACY_VSYSCALL_NATIVE" 'enabled' 290 echo " $(wrap_color '(dangerous, provides an ASLR-bypassing target with usable ROP gadgets.)' bold black)" 291 elif is_set LEGACY_VSYSCALL_EMULATE; then 292 printf -- '- ' 293 wrap_good "CONFIG_LEGACY_VSYSCALL_EMULATE" 'enabled' 294 elif is_set LEGACY_VSYSCALL_NONE; then 295 printf -- '- ' 296 wrap_bad "CONFIG_LEGACY_VSYSCALL_NONE" 'enabled' 297 echo " $(wrap_color '(containers using eglibc <= 2.13 will not work. Switch to' bold black)" 298 echo " $(wrap_color ' "CONFIG_VSYSCALL_[NATIVE|EMULATE]" or use "vsyscall=[native|emulate]"' bold black)" 299 echo " $(wrap_color ' on kernel command line. Note that this will disable ASLR for the,' bold black)" 300 echo " $(wrap_color ' VDSO which may assist in exploiting security vulnerabilities.)' bold black)" 301 # else Older kernels (prior to 3dc33bd30f3e, released in v4.40-rc1) do 302 # not have these LEGACY_VSYSCALL options and are effectively 303 # LEGACY_VSYSCALL_EMULATE. Even older kernels are presumably 304 # effectively LEGACY_VSYSCALL_NATIVE. 305 fi 306 } 307 308 if [ "$kernelMajor" -lt 4 ] || ([ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -le 5 ]); then 309 check_flags MEMCG_KMEM 310 fi 311 312 if [ "$kernelMajor" -lt 3 ] || ([ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 18 ]); then 313 check_flags RESOURCE_COUNTERS 314 fi 315 316 if [ "$kernelMajor" -lt 3 ] || ([ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 13 ]); then 317 netprio=NETPRIO_CGROUP 318 else 319 netprio=CGROUP_NET_PRIO 320 fi 321 322 if [ "$kernelMajor" -lt 5 ]; then 323 check_flags IOSCHED_CFQ CFQ_GROUP_IOSCHED 324 fi 325 326 check_flags \ 327 BLK_CGROUP BLK_DEV_THROTTLING \ 328 CGROUP_PERF \ 329 CGROUP_HUGETLB \ 330 NET_CLS_CGROUP $netprio \ 331 CFS_BANDWIDTH FAIR_GROUP_SCHED \ 332 IP_NF_TARGET_REDIRECT \ 333 IP_VS \ 334 IP_VS_NFCT \ 335 IP_VS_PROTO_TCP \ 336 IP_VS_PROTO_UDP \ 337 IP_VS_RR \ 338 SECURITY_SELINUX \ 339 SECURITY_APPARMOR 340 341 if ! is_set EXT4_USE_FOR_EXT2; then 342 check_flags EXT3_FS EXT3_FS_XATTR EXT3_FS_POSIX_ACL EXT3_FS_SECURITY 343 if ! is_set EXT3_FS || ! is_set EXT3_FS_XATTR || ! is_set EXT3_FS_POSIX_ACL || ! is_set EXT3_FS_SECURITY; then 344 echo " $(wrap_color '(enable these ext3 configs if you are using ext3 as backing filesystem)' bold black)" 345 fi 346 fi 347 348 check_flags EXT4_FS EXT4_FS_POSIX_ACL EXT4_FS_SECURITY 349 if ! is_set EXT4_FS || ! is_set EXT4_FS_POSIX_ACL || ! is_set EXT4_FS_SECURITY; then 350 if is_set EXT4_USE_FOR_EXT2; then 351 echo " $(wrap_color 'enable these ext4 configs if you are using ext3 or ext4 as backing filesystem' bold black)" 352 else 353 echo " $(wrap_color 'enable these ext4 configs if you are using ext4 as backing filesystem' bold black)" 354 fi 355 fi 356 357 echo '- Network Drivers:' 358 echo " - \"$(wrap_color 'overlay' blue)\":" 359 check_flags VXLAN BRIDGE_VLAN_FILTERING | sed 's/^/ /' 360 echo ' Optional (for encrypted networks):' 361 check_flags CRYPTO CRYPTO_AEAD CRYPTO_GCM CRYPTO_SEQIV CRYPTO_GHASH \ 362 XFRM XFRM_USER XFRM_ALGO INET_ESP NETFILTER_XT_MATCH_BPF | sed 's/^/ /' 363 if [ "$kernelMajor" -lt 5 ] || [ "$kernelMajor" -eq 5 -a "$kernelMinor" -le 3 ]; then 364 check_flags INET_XFRM_MODE_TRANSPORT | sed 's/^/ /' 365 fi 366 echo " - \"$(wrap_color 'ipvlan' blue)\":" 367 check_flags IPVLAN | sed 's/^/ /' 368 echo " - \"$(wrap_color 'macvlan' blue)\":" 369 check_flags MACVLAN DUMMY | sed 's/^/ /' 370 echo " - \"$(wrap_color 'ftp,tftp client in container' blue)\":" 371 check_flags NF_NAT_FTP NF_CONNTRACK_FTP NF_NAT_TFTP NF_CONNTRACK_TFTP | sed 's/^/ /' 372 373 # only fail if no storage drivers available 374 CODE=${EXITCODE} 375 EXITCODE=0 376 STORAGE=1 377 378 echo '- Storage Drivers:' 379 echo " - \"$(wrap_color 'btrfs' blue)\":" 380 check_flags BTRFS_FS | sed 's/^/ /' 381 check_flags BTRFS_FS_POSIX_ACL | sed 's/^/ /' 382 [ "$EXITCODE" = 0 ] && STORAGE=0 383 EXITCODE=0 384 385 echo " - \"$(wrap_color 'overlay' blue)\":" 386 check_flags OVERLAY_FS | sed 's/^/ /' 387 [ "$EXITCODE" = 0 ] && STORAGE=0 388 EXITCODE=0 389 390 echo " - \"$(wrap_color 'zfs' blue)\":" 391 printf ' - ' 392 check_device /dev/zfs 393 printf ' - ' 394 check_command zfs 395 printf ' - ' 396 check_command zpool 397 [ "$EXITCODE" = 0 ] && STORAGE=0 398 EXITCODE=0 399 400 EXITCODE=$CODE 401 [ "$STORAGE" = 1 ] && EXITCODE=1 402 403 echo 404 405 check_limit_over() { 406 if [ "$(cat "$1")" -le "$2" ]; then 407 wrap_bad "- $1" "$(cat "$1")" 408 wrap_color " This should be set to at least $2, for example set: sysctl -w kernel/keys/root_maxkeys=1000000" bold black 409 EXITCODE=1 410 else 411 wrap_good "- $1" "$(cat "$1")" 412 fi 413 } 414 415 echo 'Limits:' 416 check_limit_over /proc/sys/kernel/keys/root_maxkeys 10000 417 echo 418 419 exit $EXITCODE