Don't allow io_uring related syscalls in the RuntimeDefault seccomp profile.
Signed-off-by: Vinayak Goyal <vinaygo@google.com>
This commit is contained in:
		| @@ -183,9 +183,6 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp { | ||||
| 				"ioprio_set", | ||||
| 				"io_setup", | ||||
| 				"io_submit", | ||||
| 				"io_uring_enter", | ||||
| 				"io_uring_register", | ||||
| 				"io_uring_setup", | ||||
| 				"ipc", | ||||
| 				"kill", | ||||
| 				"landlock_add_rule", | ||||
|   | ||||
							
								
								
									
										36
									
								
								contrib/seccomp/seccomp_default_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										36
									
								
								contrib/seccomp/seccomp_default_test.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,36 @@ | ||||
| package seccomp | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/opencontainers/runtime-spec/specs-go" | ||||
| ) | ||||
|  | ||||
| func TestIOUringIsNotAllowed(t *testing.T) { | ||||
|  | ||||
| 	disallowed := map[string]bool{ | ||||
| 		"io_uring_enter":    true, | ||||
| 		"io_uring_register": true, | ||||
| 		"io_uring_setup":    true, | ||||
| 	} | ||||
|  | ||||
| 	got := DefaultProfile(&specs.Spec{ | ||||
| 		Process: &specs.Process{ | ||||
| 			Capabilities: &specs.LinuxCapabilities{ | ||||
| 				Bounding: []string{}, | ||||
| 			}, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	for _, config := range got.Syscalls { | ||||
| 		if config.Action != specs.ActAllow { | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		for _, name := range config.Names { | ||||
| 			if disallowed[name] { | ||||
| 				t.Errorf("found disallowed io_uring related syscalls") | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
		Reference in New Issue
	
	Block a user
	 Vinayak Goyal
					Vinayak Goyal