Revert "seccomp: whitelist io-uring related system calls"#41223
Revert "seccomp: whitelist io-uring related system calls"#41223AkihiroSuda wants to merge 1 commit intomasterfrom
Conversation
|
I don't think it's necessary to revert. The default profile allows everything that you can do with |
|
I agree with cyphar. The topics were more about the ability to configure the filter for uring syscalls, not that it really created any security issue yet, especially not for the default config. |
|
we are in the process of discussing enabling From the discussion we had (containers/common#1264), we believe that enabling it is not future-proof as we have no control over what syscalls might be enabled in It is just a theoretical question at this point but how this would be future-proof as we have no control over the syscalls that will be added in the future to |
|
On the other hand, if any syscall adds a feature that opens a potential security issue ( I spoke to Jens Axboe at LPC and he said that in general they would be open to having a more capable restriction mechanism for io_uring (but for obvious reasons we cannot use seccomp for this) so this might be improved in the future. (As an aside, If we do have to block io_uring-related syscalls we need to make them return |
|
I wonder why the syscalls called by |
|
for future visitors; these were removed again in; |
Reverts #39415
See #39415 (comment)