Merge pull request #9320 from vinayakankugoyal/io_uring

Don't allow io_uring related syscalls in the RuntimeDefault seccomp profile.
This commit is contained in:
Phil Estes
2023-11-02 14:43:35 +00:00
committed by GitHub
2 changed files with 36 additions and 3 deletions

View File

@@ -183,9 +183,6 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
"ioprio_set",
"io_setup",
"io_submit",
"io_uring_enter",
"io_uring_register",
"io_uring_setup",
"ipc",
"kill",
"landlock_add_rule",

View File

@@ -0,0 +1,36 @@
package seccomp
import (
"testing"
"github.com/opencontainers/runtime-spec/specs-go"
)
func TestIOUringIsNotAllowed(t *testing.T) {
disallowed := map[string]bool{
"io_uring_enter": true,
"io_uring_register": true,
"io_uring_setup": true,
}
got := DefaultProfile(&specs.Spec{
Process: &specs.Process{
Capabilities: &specs.LinuxCapabilities{
Bounding: []string{},
},
},
})
for _, config := range got.Syscalls {
if config.Action != specs.ActAllow {
continue
}
for _, name := range config.Names {
if disallowed[name] {
t.Errorf("found disallowed io_uring related syscalls")
}
}
}
}