Skip to content

Commit

Permalink
seccomp: block syscall()
Browse files Browse the repository at this point in the history
syscall() emulates all other syscalls, so having this allowed makes no
sense as far as seccomp filters go.

This is a breaking change, but this probably will not break much.

Signed-off-by: Dominique Martinet <dominique.martinet@atmark-techno.com>
  • Loading branch information
martinetd committed Jun 6, 2024
1 parent daa81f1 commit d3283f8
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion pkg/seccomp/default_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,7 @@ func DefaultProfile() *Seccomp {
"ssetmask",
"swapoff",
"swapon",
"syscall",
"sysfs",
"uselib",
"userfaultfd",
Expand Down Expand Up @@ -422,7 +423,6 @@ func DefaultProfile() *Seccomp {
"sync",
"sync_file_range",
"syncfs",
"syscall",
"sysinfo",
"syslog",
"tee",
Expand Down
2 changes: 1 addition & 1 deletion pkg/seccomp/seccomp.json
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,7 @@
"ssetmask",
"swapoff",
"swapon",
"syscall",
"sysfs",
"uselib",
"userfaultfd",
Expand Down Expand Up @@ -429,7 +430,6 @@
"sync",
"sync_file_range",
"syncfs",
"syscall",
"sysinfo",
"syslog",
"tee",
Expand Down

0 comments on commit d3283f8

Please sign in to comment.