mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-19 18:02:01 +00:00
Merge pull request #116792 from pacoxu/fix-safe-sysctl-windows
safe-sysctl: skip checking for windows
This commit is contained in:
commit
9c6414cdfe
@ -17,11 +17,15 @@ limitations under the License.
|
|||||||
package sysctl
|
package sysctl
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
|
goruntime "runtime"
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/util/version"
|
"k8s.io/apimachinery/pkg/util/version"
|
||||||
"k8s.io/klog/v2"
|
"k8s.io/klog/v2"
|
||||||
"k8s.io/kubernetes/pkg/proxy/ipvs"
|
"k8s.io/kubernetes/pkg/proxy/ipvs"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// refer to https://github.com/torvalds/linux/commit/122ff243f5f104194750ecbc76d5946dd1eec934.
|
||||||
const ipLocalReservedPortsMinNamespacedKernelVersion = "3.16"
|
const ipLocalReservedPortsMinNamespacedKernelVersion = "3.16"
|
||||||
|
|
||||||
var safeSysctls = []string{
|
var safeSysctls = []string{
|
||||||
@ -32,33 +36,44 @@ var safeSysctls = []string{
|
|||||||
"net.ipv4.ip_unprivileged_port_start",
|
"net.ipv4.ip_unprivileged_port_start",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var safeSysctlsIncludeReservedPorts = []string{
|
||||||
|
"kernel.shm_rmid_forced",
|
||||||
|
"net.ipv4.ip_local_port_range",
|
||||||
|
"net.ipv4.tcp_syncookies",
|
||||||
|
"net.ipv4.ping_group_range",
|
||||||
|
"net.ipv4.ip_unprivileged_port_start",
|
||||||
|
"net.ipv4.ip_local_reserved_ports",
|
||||||
|
}
|
||||||
|
|
||||||
// SafeSysctlAllowlist returns the allowlist of safe sysctls and safe sysctl patterns (ending in *).
|
// SafeSysctlAllowlist returns the allowlist of safe sysctls and safe sysctl patterns (ending in *).
|
||||||
//
|
//
|
||||||
// A sysctl is called safe iff
|
// A sysctl is called safe iff
|
||||||
// - it is namespaced in the container or the pod
|
// - it is namespaced in the container or the pod
|
||||||
// - it is isolated, i.e. has no influence on any other pod on the same node.
|
// - it is isolated, i.e. has no influence on any other pod on the same node.
|
||||||
func SafeSysctlAllowlist() []string {
|
func SafeSysctlAllowlist() []string {
|
||||||
|
if goruntime.GOOS == "linux" {
|
||||||
|
// make sure we're on a new enough kernel that the ip_local_reserved_ports sysctl is namespaced
|
||||||
|
kernelVersion, err := getKernelVersion()
|
||||||
|
if err != nil {
|
||||||
|
klog.ErrorS(err, "Failed to get kernel version, dropping net.ipv4.ip_local_reserved_ports from safe sysctl list")
|
||||||
|
return safeSysctls
|
||||||
|
}
|
||||||
|
if kernelVersion.LessThan(version.MustParseGeneric(ipLocalReservedPortsMinNamespacedKernelVersion)) {
|
||||||
|
klog.ErrorS(nil, "Kernel version is too old, dropping net.ipv4.ip_local_reserved_ports from safe sysctl list", "kernelVersion", kernelVersion)
|
||||||
|
return safeSysctls
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return safeSysctlsIncludeReservedPorts
|
||||||
|
}
|
||||||
|
|
||||||
|
func getKernelVersion() (*version.Version, error) {
|
||||||
kernelVersionStr, err := ipvs.NewLinuxKernelHandler().GetKernelVersion()
|
kernelVersionStr, err := ipvs.NewLinuxKernelHandler().GetKernelVersion()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
klog.ErrorS(err, "Failed to get kernel version.")
|
return nil, fmt.Errorf("failed to get kernel version: %w", err)
|
||||||
return safeSysctls
|
|
||||||
}
|
}
|
||||||
kernelVersion, err := version.ParseGeneric(kernelVersionStr)
|
kernelVersion, err := version.ParseGeneric(kernelVersionStr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
klog.ErrorS(err, "Failed to parse kernel version.")
|
return nil, fmt.Errorf("failed to parse kernel version: %w", err)
|
||||||
return safeSysctls
|
|
||||||
}
|
|
||||||
// ip_local_reserved_ports has been changed to namesapced since kernel v3.16.
|
|
||||||
// refer to https://github.com/torvalds/linux/commit/122ff243f5f104194750ecbc76d5946dd1eec934.
|
|
||||||
if kernelVersion.LessThan(version.MustParseGeneric(ipLocalReservedPortsMinNamespacedKernelVersion)) {
|
|
||||||
return safeSysctls
|
|
||||||
}
|
|
||||||
return []string{
|
|
||||||
"kernel.shm_rmid_forced",
|
|
||||||
"net.ipv4.ip_local_port_range",
|
|
||||||
"net.ipv4.tcp_syncookies",
|
|
||||||
"net.ipv4.ping_group_range",
|
|
||||||
"net.ipv4.ip_unprivileged_port_start",
|
|
||||||
"net.ipv4.ip_local_reserved_ports",
|
|
||||||
}
|
}
|
||||||
|
return kernelVersion, nil
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user