Skip to content

Commit e1445df

Browse files
thaJeztahcyphar
andcommitted
profiles: seccomp: update to Linux 5.11 syscall list
These syscalls (some of which have been in Linux for a while but were missing from the profile) fall into a few buckets: * close_range(2), epoll_wait2(2) are just extensions of existing "safe for everyone" syscalls. * The mountv2 API syscalls (fs*(2), move_mount(2), open_tree(2)) are all equivalent to aspects of mount(2) and thus go into the CAP_SYS_ADMIN category. * process_madvise(2) is similar to the other process_*(2) syscalls and thus goes in the CAP_SYS_PTRACE category. Co-authored-by: Aleksa Sarai <[email protected]> Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 83f8d61 commit e1445df

1 file changed

Lines changed: 9 additions & 0 deletions

File tree

contrib/seccomp/seccomp_default.go

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,7 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
7474
"clock_nanosleep",
7575
"clock_nanosleep_time64",
7676
"close",
77+
"close_range",
7778
"connect",
7879
"copy_file_range",
7980
"creat",
@@ -85,6 +86,7 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
8586
"epoll_ctl",
8687
"epoll_ctl_old",
8788
"epoll_pwait",
89+
"epoll_pwait2",
8890
"epoll_wait",
8991
"epoll_wait_old",
9092
"eventfd",
@@ -525,9 +527,15 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
525527
"bpf",
526528
"clone",
527529
"fanotify_init",
530+
"fsconfig",
531+
"fsmount",
532+
"fsopen",
533+
"fspick",
528534
"lookup_dcookie",
529535
"mount",
536+
"move_mount",
530537
"name_to_handle_at",
538+
"open_tree",
531539
"perf_event_open",
532540
"quotactl",
533541
"setdomainname",
@@ -574,6 +582,7 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
574582
Names: []string{
575583
"kcmp",
576584
"pidfd_getfd",
585+
"process_madvise",
577586
"process_vm_readv",
578587
"process_vm_writev",
579588
"ptrace",

0 commit comments

Comments
 (0)