containerd/contrib/seccomp/seccomp_default_test.go
Vinayak Goyal a48ddf4a20 Don't allow io_uring related syscalls in the RuntimeDefault seccomp profile.
Signed-off-by: Vinayak Goyal <vinaygo@google.com>
2023-11-02 01:23:58 +00:00

37 lines
640 B
Go

package seccomp
import (
"testing"
"github.com/opencontainers/runtime-spec/specs-go"
)
func TestIOUringIsNotAllowed(t *testing.T) {
disallowed := map[string]bool{
"io_uring_enter": true,
"io_uring_register": true,
"io_uring_setup": true,
}
got := DefaultProfile(&specs.Spec{
Process: &specs.Process{
Capabilities: &specs.LinuxCapabilities{
Bounding: []string{},
},
},
})
for _, config := range got.Syscalls {
if config.Action != specs.ActAllow {
continue
}
for _, name := range config.Names {
if disallowed[name] {
t.Errorf("found disallowed io_uring related syscalls")
}
}
}
}