Skip to content

Commit 07ea7b9

Browse files
neersightedbartier
andcommitted
seccomp: always allow name_to_handle_at
This syscall is used by systemd to request unique internal names for paths in the cgroup hierarchy from the kernel, and is overall innocuous. Due to [previous][1] [mistakes][2] in moby/moby, it ended up attached to `CAP_SYS_ADMIN`; however, it should not be filtered at all. An in-depth analysis is available [at moby/moby][3]. [1]: moby/moby@a01c4dc#diff-6c0d906dbef148d2060ed71a7461907e5601fea78866e4183835c60e5d2ff01aR1627-R1639 [2]: moby/moby@c1ca124 [3]: moby/moby#45766 (review) Co-authored-by: Vitor Anjos <[email protected]> Signed-off-by: Bjorn Neergaard <[email protected]> (cherry picked from commit 9a202e3) Signed-off-by: Bjorn Neergaard <[email protected]>
1 parent f77f587 commit 07ea7b9

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

contrib/seccomp/seccomp_default.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,6 +238,7 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
238238
"munlock",
239239
"munlockall",
240240
"munmap",
241+
"name_to_handle_at",
241242
"nanosleep",
242243
"newfstatat",
243244
"_newselect",
@@ -572,7 +573,6 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
572573
"mount",
573574
"mount_setattr",
574575
"move_mount",
575-
"name_to_handle_at",
576576
"open_tree",
577577
"perf_event_open",
578578
"quotactl",

0 commit comments

Comments
 (0)