Skip to content

Commit 9a202e3

Browse files
neersightedbartier
andcommitted
seccomp: always allow name_to_handle_at
This syscall is used by systemd to request unique internal names for paths in the cgroup hierarchy from the kernel, and is overall innocuous. Due to [previous][1] [mistakes][2] in moby/moby, it ended up attached to `CAP_SYS_ADMIN`; however, it should not be filtered at all. An in-depth analysis is available [at moby/moby][3]. [1]: moby/moby@a01c4dc#diff-6c0d906dbef148d2060ed71a7461907e5601fea78866e4183835c60e5d2ff01aR1627-R1639 [2]: moby/moby@c1ca124 [3]: moby/moby#45766 (review) Co-authored-by: Vitor Anjos <[email protected]> Signed-off-by: Bjorn Neergaard <[email protected]>
1 parent 9b4ed8a commit 9a202e3

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

contrib/seccomp/seccomp_default.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,6 +237,7 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
237237
"munlock",
238238
"munlockall",
239239
"munmap",
240+
"name_to_handle_at",
240241
"nanosleep",
241242
"newfstatat",
242243
"_newselect",
@@ -585,7 +586,6 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
585586
"mount",
586587
"mount_setattr",
587588
"move_mount",
588-
"name_to_handle_at",
589589
"open_tree",
590590
"perf_event_open",
591591
"quotactl",

0 commit comments

Comments
 (0)