-
Notifications
You must be signed in to change notification settings - Fork 33
update seccomp rules #818
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
update seccomp rules #818
Conversation
Reviewer's Guide by SourceryThis pull request modifies the seccomp rules to allow the No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @dougsland - I've reviewed your changes - here's some feedback:
Overall Comments:
- Consider adding a comment in the code explaining why these specific SCHED policies are allowed.
Here's what I looked at during the review
- 🟢 General issues: all looks good
- 🟢 Security: all looks good
- 🟢 Testing: all looks good
- 🟢 Complexity: all looks good
- 🟢 Documentation: all looks good
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
Output now:
|
The current seccomp changes completely disallow calling sched_setscheduler, but we can safely allow calling it with policy==SCHED_OTHER/BATCH/IDLE, as really the only problem is the various real-time classes. The profile argument is the second (id 1) and the values for the classes are OTHER=0, BATCH==3, IDLE==5 Resolves: #702 Signed-off-by: Douglas Schilling Landgraf <[email protected]>
@giuseppe PTAL |
where is the ALLOW rule added? |
This is always something we should have added to podman Then add those access to allowed seccomp filters. Similarly podman run --security-opt seccomp:-ioclt,mkdir ... |
Looks good to me. |
Am I doing something wrong @alexlarsson?
My seccomp:
|
Sounds weird to me but this make it work as Function not implemented for SCHED_FIFO and SCHED_RR shows Operation not permitted.
|
On the other side, a simple rule like below works well (
|
have you tried adding 3 new rules ($arg1 == 0, $arg1 == 3, $arg1 == 5) each with action |
Yes, with 3 allow. SCHED_FIFO SCHED_RR still succeeded
|
The current seccomp changes completely disallow calling sched_setscheduler, but we can safely allow calling it with policy==SCHED_OTHER/BATCH/IDLE, as really the only problem is the various real-time classes.
The profile argument is the second (id 1) and the values for the classes are OTHER=0, BATCH==3, IDLE==5
Resolves: #702
Summary by Sourcery
Bug Fixes: