|
@@ -6,1874 +6,597 @@ import (
|
|
|
"syscall"
|
|
|
|
|
|
"github.com/docker/engine-api/types"
|
|
|
- "github.com/opencontainers/runtime-spec/specs-go"
|
|
|
- libseccomp "github.com/seccomp/libseccomp-golang"
|
|
|
)
|
|
|
|
|
|
-func arches() []types.Arch {
|
|
|
- var native, err = libseccomp.GetNativeArch()
|
|
|
- if err != nil {
|
|
|
- return []types.Arch{}
|
|
|
- }
|
|
|
- var a = native.String()
|
|
|
- switch a {
|
|
|
- case "amd64":
|
|
|
- return []types.Arch{types.ArchX86_64, types.ArchX86, types.ArchX32}
|
|
|
- case "arm64":
|
|
|
- return []types.Arch{types.ArchARM, types.ArchAARCH64}
|
|
|
- case "mips64":
|
|
|
- return []types.Arch{types.ArchMIPS, types.ArchMIPS64, types.ArchMIPS64N32}
|
|
|
- case "mips64n32":
|
|
|
- return []types.Arch{types.ArchMIPS, types.ArchMIPS64, types.ArchMIPS64N32}
|
|
|
- case "mipsel64":
|
|
|
- return []types.Arch{types.ArchMIPSEL, types.ArchMIPSEL64, types.ArchMIPSEL64N32}
|
|
|
- case "mipsel64n32":
|
|
|
- return []types.Arch{types.ArchMIPSEL, types.ArchMIPSEL64, types.ArchMIPSEL64N32}
|
|
|
- case "s390x":
|
|
|
- return []types.Arch{types.ArchS390, types.ArchS390X}
|
|
|
- default:
|
|
|
- return []types.Arch{}
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-// DefaultProfile defines the whitelist for the default seccomp profile.
|
|
|
-func DefaultProfile(rs *specs.Spec) *types.Seccomp {
|
|
|
-
|
|
|
- syscalls := []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "accept",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "accept4",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "access",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "alarm",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "bind",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
+func arches() []types.Architecture {
|
|
|
+ return []types.Architecture{
|
|
|
{
|
|
|
- Name: "brk",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchX86_64,
|
|
|
+ SubArches: []types.Arch{types.ArchX86, types.ArchX32},
|
|
|
},
|
|
|
{
|
|
|
- Name: "capget",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchAARCH64,
|
|
|
+ SubArches: []types.Arch{types.ArchARM},
|
|
|
},
|
|
|
{
|
|
|
- Name: "capset",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchMIPS64,
|
|
|
+ SubArches: []types.Arch{types.ArchMIPS, types.ArchMIPS64N32},
|
|
|
},
|
|
|
{
|
|
|
- Name: "chdir",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchMIPS64N32,
|
|
|
+ SubArches: []types.Arch{types.ArchMIPS, types.ArchMIPS64},
|
|
|
},
|
|
|
{
|
|
|
- Name: "chmod",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchMIPSEL64,
|
|
|
+ SubArches: []types.Arch{types.ArchMIPSEL, types.ArchMIPSEL64N32},
|
|
|
},
|
|
|
{
|
|
|
- Name: "chown",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchMIPSEL64N32,
|
|
|
+ SubArches: []types.Arch{types.ArchMIPSEL, types.ArchMIPSEL64},
|
|
|
},
|
|
|
{
|
|
|
- Name: "chown32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Arch: types.ArchS390X,
|
|
|
+ SubArches: []types.Arch{types.ArchS390},
|
|
|
},
|
|
|
+ }
|
|
|
+}
|
|
|
|
|
|
+// DefaultProfile defines the whitelist for the default seccomp profile.
|
|
|
+func DefaultProfile() *types.Seccomp {
|
|
|
+ syscalls := []*types.Syscall{
|
|
|
{
|
|
|
- Name: "clock_getres",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "clock_gettime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "clock_nanosleep",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "close",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "connect",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "copy_file_range",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "creat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "dup",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "dup2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "dup3",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_create",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_create1",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_ctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_ctl_old",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_pwait",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_wait",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "epoll_wait_old",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "eventfd",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "eventfd2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "execve",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "execveat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "exit",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "exit_group",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "faccessat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fadvise64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fadvise64_64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fallocate",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fanotify_mark",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchdir",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchmod",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchmodat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchown",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchown32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fchownat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fcntl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fcntl64",
|
|
|
+ Names: []string{
|
|
|
+ "accept",
|
|
|
+ "accept4",
|
|
|
+ "access",
|
|
|
+ "alarm",
|
|
|
+ "alarm",
|
|
|
+ "bind",
|
|
|
+ "brk",
|
|
|
+ "capget",
|
|
|
+ "capset",
|
|
|
+ "chdir",
|
|
|
+ "chmod",
|
|
|
+ "chown",
|
|
|
+ "chown32",
|
|
|
+ "clock_getres",
|
|
|
+ "clock_gettime",
|
|
|
+ "clock_nanosleep",
|
|
|
+ "close",
|
|
|
+ "connect",
|
|
|
+ "copy_file_range",
|
|
|
+ "creat",
|
|
|
+ "dup",
|
|
|
+ "dup2",
|
|
|
+ "dup3",
|
|
|
+ "epoll_create",
|
|
|
+ "epoll_create1",
|
|
|
+ "epoll_ctl",
|
|
|
+ "epoll_ctl_old",
|
|
|
+ "epoll_pwait",
|
|
|
+ "epoll_wait",
|
|
|
+ "epoll_wait_old",
|
|
|
+ "eventfd",
|
|
|
+ "eventfd2",
|
|
|
+ "execve",
|
|
|
+ "execveat",
|
|
|
+ "exit",
|
|
|
+ "exit_group",
|
|
|
+ "faccessat",
|
|
|
+ "fadvise64",
|
|
|
+ "fadvise64_64",
|
|
|
+ "fallocate",
|
|
|
+ "fanotify_mark",
|
|
|
+ "fchdir",
|
|
|
+ "fchmod",
|
|
|
+ "fchmodat",
|
|
|
+ "fchown",
|
|
|
+ "fchown32",
|
|
|
+ "fchownat",
|
|
|
+ "fcntl",
|
|
|
+ "fcntl64",
|
|
|
+ "fdatasync",
|
|
|
+ "fgetxattr",
|
|
|
+ "flistxattr",
|
|
|
+ "flock",
|
|
|
+ "fork",
|
|
|
+ "fremovexattr",
|
|
|
+ "fsetxattr",
|
|
|
+ "fstat",
|
|
|
+ "fstat64",
|
|
|
+ "fstatat64",
|
|
|
+ "fstatfs",
|
|
|
+ "fstatfs64",
|
|
|
+ "fsync",
|
|
|
+ "ftruncate",
|
|
|
+ "ftruncate64",
|
|
|
+ "futex",
|
|
|
+ "futimesat",
|
|
|
+ "getcpu",
|
|
|
+ "getcwd",
|
|
|
+ "getdents",
|
|
|
+ "getdents64",
|
|
|
+ "getegid",
|
|
|
+ "getegid32",
|
|
|
+ "geteuid",
|
|
|
+ "geteuid32",
|
|
|
+ "getgid",
|
|
|
+ "getgid32",
|
|
|
+ "getgroups",
|
|
|
+ "getgroups32",
|
|
|
+ "getitimer",
|
|
|
+ "getpeername",
|
|
|
+ "getpgid",
|
|
|
+ "getpgrp",
|
|
|
+ "getpid",
|
|
|
+ "getppid",
|
|
|
+ "getpriority",
|
|
|
+ "getrandom",
|
|
|
+ "getresgid",
|
|
|
+ "getresgid32",
|
|
|
+ "getresuid",
|
|
|
+ "getresuid32",
|
|
|
+ "getrlimit",
|
|
|
+ "get_robust_list",
|
|
|
+ "getrusage",
|
|
|
+ "getsid",
|
|
|
+ "getsockname",
|
|
|
+ "getsockopt",
|
|
|
+ "get_thread_area",
|
|
|
+ "gettid",
|
|
|
+ "gettimeofday",
|
|
|
+ "getuid",
|
|
|
+ "getuid32",
|
|
|
+ "getxattr",
|
|
|
+ "inotify_add_watch",
|
|
|
+ "inotify_init",
|
|
|
+ "inotify_init1",
|
|
|
+ "inotify_rm_watch",
|
|
|
+ "io_cancel",
|
|
|
+ "ioctl",
|
|
|
+ "io_destroy",
|
|
|
+ "io_getevents",
|
|
|
+ "ioprio_get",
|
|
|
+ "ioprio_set",
|
|
|
+ "io_setup",
|
|
|
+ "io_submit",
|
|
|
+ "ipc",
|
|
|
+ "kill",
|
|
|
+ "lchown",
|
|
|
+ "lchown32",
|
|
|
+ "lgetxattr",
|
|
|
+ "link",
|
|
|
+ "linkat",
|
|
|
+ "listen",
|
|
|
+ "listxattr",
|
|
|
+ "llistxattr",
|
|
|
+ "_llseek",
|
|
|
+ "lremovexattr",
|
|
|
+ "lseek",
|
|
|
+ "lsetxattr",
|
|
|
+ "lstat",
|
|
|
+ "lstat64",
|
|
|
+ "madvise",
|
|
|
+ "memfd_create",
|
|
|
+ "mincore",
|
|
|
+ "mkdir",
|
|
|
+ "mkdirat",
|
|
|
+ "mknod",
|
|
|
+ "mknodat",
|
|
|
+ "mlock",
|
|
|
+ "mlock2",
|
|
|
+ "mlockall",
|
|
|
+ "mmap",
|
|
|
+ "mmap2",
|
|
|
+ "mprotect",
|
|
|
+ "mq_getsetattr",
|
|
|
+ "mq_notify",
|
|
|
+ "mq_open",
|
|
|
+ "mq_timedreceive",
|
|
|
+ "mq_timedsend",
|
|
|
+ "mq_unlink",
|
|
|
+ "mremap",
|
|
|
+ "msgctl",
|
|
|
+ "msgget",
|
|
|
+ "msgrcv",
|
|
|
+ "msgsnd",
|
|
|
+ "msync",
|
|
|
+ "munlock",
|
|
|
+ "munlockall",
|
|
|
+ "munmap",
|
|
|
+ "nanosleep",
|
|
|
+ "newfstatat",
|
|
|
+ "_newselect",
|
|
|
+ "open",
|
|
|
+ "openat",
|
|
|
+ "pause",
|
|
|
+ "pipe",
|
|
|
+ "pipe2",
|
|
|
+ "poll",
|
|
|
+ "ppoll",
|
|
|
+ "prctl",
|
|
|
+ "pread64",
|
|
|
+ "preadv",
|
|
|
+ "prlimit64",
|
|
|
+ "pselect6",
|
|
|
+ "pwrite64",
|
|
|
+ "pwritev",
|
|
|
+ "read",
|
|
|
+ "readahead",
|
|
|
+ "readlink",
|
|
|
+ "readlinkat",
|
|
|
+ "readv",
|
|
|
+ "recv",
|
|
|
+ "recvfrom",
|
|
|
+ "recvmmsg",
|
|
|
+ "recvmsg",
|
|
|
+ "remap_file_pages",
|
|
|
+ "removexattr",
|
|
|
+ "rename",
|
|
|
+ "renameat",
|
|
|
+ "renameat2",
|
|
|
+ "restart_syscall",
|
|
|
+ "rmdir",
|
|
|
+ "rt_sigaction",
|
|
|
+ "rt_sigpending",
|
|
|
+ "rt_sigprocmask",
|
|
|
+ "rt_sigqueueinfo",
|
|
|
+ "rt_sigreturn",
|
|
|
+ "rt_sigsuspend",
|
|
|
+ "rt_sigtimedwait",
|
|
|
+ "rt_tgsigqueueinfo",
|
|
|
+ "sched_getaffinity",
|
|
|
+ "sched_getattr",
|
|
|
+ "sched_getparam",
|
|
|
+ "sched_get_priority_max",
|
|
|
+ "sched_get_priority_min",
|
|
|
+ "sched_getscheduler",
|
|
|
+ "sched_rr_get_interval",
|
|
|
+ "sched_setaffinity",
|
|
|
+ "sched_setattr",
|
|
|
+ "sched_setparam",
|
|
|
+ "sched_setscheduler",
|
|
|
+ "sched_yield",
|
|
|
+ "seccomp",
|
|
|
+ "select",
|
|
|
+ "semctl",
|
|
|
+ "semget",
|
|
|
+ "semop",
|
|
|
+ "semtimedop",
|
|
|
+ "send",
|
|
|
+ "sendfile",
|
|
|
+ "sendfile64",
|
|
|
+ "sendmmsg",
|
|
|
+ "sendmsg",
|
|
|
+ "sendto",
|
|
|
+ "setfsgid",
|
|
|
+ "setfsgid32",
|
|
|
+ "setfsuid",
|
|
|
+ "setfsuid32",
|
|
|
+ "setgid",
|
|
|
+ "setgid32",
|
|
|
+ "setgroups",
|
|
|
+ "setgroups32",
|
|
|
+ "setitimer",
|
|
|
+ "setpgid",
|
|
|
+ "setpriority",
|
|
|
+ "setregid",
|
|
|
+ "setregid32",
|
|
|
+ "setresgid",
|
|
|
+ "setresgid32",
|
|
|
+ "setresuid",
|
|
|
+ "setresuid32",
|
|
|
+ "setreuid",
|
|
|
+ "setreuid32",
|
|
|
+ "setrlimit",
|
|
|
+ "set_robust_list",
|
|
|
+ "setsid",
|
|
|
+ "setsockopt",
|
|
|
+ "set_thread_area",
|
|
|
+ "set_tid_address",
|
|
|
+ "setuid",
|
|
|
+ "setuid32",
|
|
|
+ "setxattr",
|
|
|
+ "shmat",
|
|
|
+ "shmctl",
|
|
|
+ "shmdt",
|
|
|
+ "shmget",
|
|
|
+ "shutdown",
|
|
|
+ "sigaltstack",
|
|
|
+ "signalfd",
|
|
|
+ "signalfd4",
|
|
|
+ "sigreturn",
|
|
|
+ "socket",
|
|
|
+ "socketcall",
|
|
|
+ "socketpair",
|
|
|
+ "splice",
|
|
|
+ "stat",
|
|
|
+ "stat64",
|
|
|
+ "statfs",
|
|
|
+ "statfs64",
|
|
|
+ "symlink",
|
|
|
+ "symlinkat",
|
|
|
+ "sync",
|
|
|
+ "sync_file_range",
|
|
|
+ "syncfs",
|
|
|
+ "sysinfo",
|
|
|
+ "syslog",
|
|
|
+ "tee",
|
|
|
+ "tgkill",
|
|
|
+ "time",
|
|
|
+ "timer_create",
|
|
|
+ "timer_delete",
|
|
|
+ "timerfd_create",
|
|
|
+ "timerfd_gettime",
|
|
|
+ "timerfd_settime",
|
|
|
+ "timer_getoverrun",
|
|
|
+ "timer_gettime",
|
|
|
+ "timer_settime",
|
|
|
+ "times",
|
|
|
+ "tkill",
|
|
|
+ "truncate",
|
|
|
+ "truncate64",
|
|
|
+ "ugetrlimit",
|
|
|
+ "umask",
|
|
|
+ "uname",
|
|
|
+ "unlink",
|
|
|
+ "unlinkat",
|
|
|
+ "utime",
|
|
|
+ "utimensat",
|
|
|
+ "utimes",
|
|
|
+ "vfork",
|
|
|
+ "vmsplice",
|
|
|
+ "wait4",
|
|
|
+ "waitid",
|
|
|
+ "waitpid",
|
|
|
+ "write",
|
|
|
+ "writev",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
},
|
|
|
{
|
|
|
- Name: "fdatasync",
|
|
|
+ Names: []string{"personality"},
|
|
|
Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Args: []*types.Arg{
|
|
|
+ {
|
|
|
+ Index: 0,
|
|
|
+ Value: 0x0,
|
|
|
+ Op: types.OpEqualTo,
|
|
|
+ },
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fgetxattr",
|
|
|
+ Names: []string{"personality"},
|
|
|
Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Args: []*types.Arg{
|
|
|
+ {
|
|
|
+ Index: 0,
|
|
|
+ Value: 0x0008,
|
|
|
+ Op: types.OpEqualTo,
|
|
|
+ },
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "flistxattr",
|
|
|
+ Names: []string{"personality"},
|
|
|
Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Args: []*types.Arg{
|
|
|
+ {
|
|
|
+ Index: 0,
|
|
|
+ Value: 0xffffffff,
|
|
|
+ Op: types.OpEqualTo,
|
|
|
+ },
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "flock",
|
|
|
+ Names: []string{
|
|
|
+ "breakpoint",
|
|
|
+ "cacheflush",
|
|
|
+ "set_tls",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Arches: []string{"arm", "arm64"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fork",
|
|
|
+ Names: []string{
|
|
|
+ "arch_prctl",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Arches: []string{"amd64", "x32"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fremovexattr",
|
|
|
+ Names: []string{
|
|
|
+ "modify_ldt",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Arches: []string{"amd64", "x32", "x86"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fsetxattr",
|
|
|
+ Names: []string{
|
|
|
+ "s390_pci_mmio_read",
|
|
|
+ "s390_pci_mmio_write",
|
|
|
+ "s390_runtime_instr",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Arches: []string{"s390", "s390x"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fstat",
|
|
|
+ Names: []string{
|
|
|
+ "open_by_handle_at",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_DAC_READ_SEARCH"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fstat64",
|
|
|
+ Names: []string{
|
|
|
+ "bpf",
|
|
|
+ "clone",
|
|
|
+ "fanotify_init",
|
|
|
+ "lookup_dcookie",
|
|
|
+ "mount",
|
|
|
+ "name_to_handle_at",
|
|
|
+ "perf_event_open",
|
|
|
+ "setdomainname",
|
|
|
+ "sethostname",
|
|
|
+ "setns",
|
|
|
+ "umount",
|
|
|
+ "umount2",
|
|
|
+ "unshare",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_ADMIN"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fstatat64",
|
|
|
+ Names: []string{
|
|
|
+ "clone",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Args: []*types.Arg{
|
|
|
+ {
|
|
|
+ Index: 0,
|
|
|
+ Value: syscall.CLONE_NEWNS | syscall.CLONE_NEWUTS | syscall.CLONE_NEWIPC | syscall.CLONE_NEWUSER | syscall.CLONE_NEWPID | syscall.CLONE_NEWNET,
|
|
|
+ ValueTwo: 0,
|
|
|
+ Op: types.OpMaskedEqual,
|
|
|
+ },
|
|
|
+ },
|
|
|
+ Excludes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_ADMIN"},
|
|
|
+ Arches: []string{"s390", "s390x"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fstatfs",
|
|
|
+ Names: []string{
|
|
|
+ "clone",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
+ Args: []*types.Arg{
|
|
|
+ {
|
|
|
+ Index: 1,
|
|
|
+ Value: syscall.CLONE_NEWNS | syscall.CLONE_NEWUTS | syscall.CLONE_NEWIPC | syscall.CLONE_NEWUSER | syscall.CLONE_NEWPID | syscall.CLONE_NEWNET,
|
|
|
+ ValueTwo: 0,
|
|
|
+ Op: types.OpMaskedEqual,
|
|
|
+ },
|
|
|
+ },
|
|
|
+ Comment: "s390 parameter ordering for clone is different",
|
|
|
+ Includes: types.Filter{
|
|
|
+ Arches: []string{"s390", "s390x"},
|
|
|
+ },
|
|
|
+ Excludes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_ADMIN"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fstatfs64",
|
|
|
+ Names: []string{
|
|
|
+ "reboot",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_BOOT"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "fsync",
|
|
|
+ Names: []string{
|
|
|
+ "chroot",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_CHROOT"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "ftruncate",
|
|
|
+ Names: []string{
|
|
|
+ "delete_module",
|
|
|
+ "init_module",
|
|
|
+ "finit_module",
|
|
|
+ "query_module",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_MODULE"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "ftruncate64",
|
|
|
+ Names: []string{
|
|
|
+ "acct",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_PACCT"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "futex",
|
|
|
+ Names: []string{
|
|
|
+ "kcmp",
|
|
|
+ "process_vm_readv",
|
|
|
+ "process_vm_writev",
|
|
|
+ "ptrace",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_PTRACE"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "futimesat",
|
|
|
+ Names: []string{
|
|
|
+ "iopl",
|
|
|
+ "ioperm",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_RAWIO"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "getcpu",
|
|
|
+ Names: []string{
|
|
|
+ "settimeofday",
|
|
|
+ "stime",
|
|
|
+ "adjtimex",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_TIME"},
|
|
|
+ },
|
|
|
},
|
|
|
{
|
|
|
- Name: "getcwd",
|
|
|
+ Names: []string{
|
|
|
+ "vhangup",
|
|
|
+ },
|
|
|
Action: types.ActAllow,
|
|
|
Args: []*types.Arg{},
|
|
|
+ Includes: types.Filter{
|
|
|
+ Caps: []string{"CAP_SYS_TTY_CONFIG"},
|
|
|
+ },
|
|
|
},
|
|
|
- {
|
|
|
- Name: "getdents",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getdents64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getegid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getegid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "geteuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "geteuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getgid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getgroups",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getgroups32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getitimer",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getpeername",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getpgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getpgrp",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getpid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getppid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getpriority",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getrandom",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getresgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getresgid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getresuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getresuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getrlimit",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "get_robust_list",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getrusage",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getsid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getsockname",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getsockopt",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "get_thread_area",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "gettid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "gettimeofday",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "getxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "inotify_add_watch",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "inotify_init",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "inotify_init1",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "inotify_rm_watch",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "io_cancel",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ioctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "io_destroy",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "io_getevents",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ioprio_get",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ioprio_set",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "io_setup",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "io_submit",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ipc",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "kill",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lchown",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lchown32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lgetxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "link",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "linkat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "listen",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "listxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "llistxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "_llseek",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lremovexattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lseek",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lsetxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lstat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lstat64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "madvise",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "memfd_create",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mincore",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mkdir",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mkdirat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mknod",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mknodat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mlock",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mlock2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mlockall",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mmap",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mmap2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mprotect",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_getsetattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_notify",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_open",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_timedreceive",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_timedsend",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mq_unlink",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mremap",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "msgctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "msgget",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "msgrcv",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "msgsnd",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "msync",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "munlock",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "munlockall",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "munmap",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "nanosleep",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "newfstatat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "_newselect",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "open",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "openat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pause",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "personality",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{
|
|
|
- {
|
|
|
- Index: 0,
|
|
|
- Value: 0x0,
|
|
|
- Op: types.OpEqualTo,
|
|
|
- },
|
|
|
- },
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "personality",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{
|
|
|
- {
|
|
|
- Index: 0,
|
|
|
- Value: 0x0008,
|
|
|
- Op: types.OpEqualTo,
|
|
|
- },
|
|
|
- },
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "personality",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{
|
|
|
- {
|
|
|
- Index: 0,
|
|
|
- Value: 0xffffffff,
|
|
|
- Op: types.OpEqualTo,
|
|
|
- },
|
|
|
- },
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pipe",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pipe2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "poll",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ppoll",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "prctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pread64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "preadv",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "prlimit64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pselect6",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pwrite64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "pwritev",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "read",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "readahead",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "readlink",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "readlinkat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "readv",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "recv",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "recvfrom",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "recvmmsg",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "recvmsg",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "remap_file_pages",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "removexattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rename",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "renameat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "renameat2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "restart_syscall",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rmdir",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigaction",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigpending",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigprocmask",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigqueueinfo",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigreturn",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigsuspend",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_sigtimedwait",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "rt_tgsigqueueinfo",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_getaffinity",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_getattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_getparam",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_get_priority_max",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_get_priority_min",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_getscheduler",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_rr_get_interval",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_setaffinity",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_setattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_setparam",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_setscheduler",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sched_yield",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "seccomp",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "select",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "semctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "semget",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "semop",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "semtimedop",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "send",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sendfile",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sendfile64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sendmmsg",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sendmsg",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sendto",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setfsgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setfsgid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setfsuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setfsuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setgid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setgroups",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setgroups32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setitimer",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setpgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setpriority",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setregid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setregid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setresgid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setresgid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setresuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setresuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setreuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setreuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setrlimit",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "set_robust_list",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setsid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setsockopt",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "set_thread_area",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "set_tid_address",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setuid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setuid32",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setxattr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "shmat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "shmctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "shmdt",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "shmget",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "shutdown",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sigaltstack",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "signalfd",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "signalfd4",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sigreturn",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "socket",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "socketcall",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "socketpair",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "splice",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "stat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "stat64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "statfs",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "statfs64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "symlink",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "symlinkat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sync",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sync_file_range",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "syncfs",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sysinfo",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "syslog",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "tee",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "tgkill",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "time",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timer_create",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timer_delete",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timerfd_create",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timerfd_gettime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timerfd_settime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timer_getoverrun",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timer_gettime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "timer_settime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "times",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "tkill",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "truncate",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "truncate64",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ugetrlimit",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "umask",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "uname",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "unlink",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "unlinkat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "utime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "utimensat",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "utimes",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "vfork",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "vmsplice",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "wait4",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "waitid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "waitpid",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "write",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "writev",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }
|
|
|
-
|
|
|
- var sysCloneFlagsIndex uint
|
|
|
- var arch string
|
|
|
- var native, err = libseccomp.GetNativeArch()
|
|
|
- if err == nil {
|
|
|
- arch = native.String()
|
|
|
- }
|
|
|
- switch arch {
|
|
|
- case "arm", "arm64":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "breakpoint",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "cacheflush",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "set_tls",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "amd64", "x32":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "arch_prctl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- fallthrough
|
|
|
- case "x86":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "modify_ldt",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "s390", "s390x":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "s390_pci_mmio_read",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "s390_pci_mmio_write",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "s390_runtime_instr",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- /* Flags parameter of the clone syscall is the 2nd on s390 */
|
|
|
- sysCloneFlagsIndex = 1
|
|
|
- }
|
|
|
-
|
|
|
- capSysAdmin := false
|
|
|
-
|
|
|
- var cap string
|
|
|
- for _, cap = range rs.Process.Capabilities {
|
|
|
- switch cap {
|
|
|
- case "CAP_DAC_READ_SEARCH":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "open_by_handle_at",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_ADMIN":
|
|
|
- capSysAdmin = true
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "bpf",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "clone",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "fanotify_init",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "lookup_dcookie",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "mount",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "name_to_handle_at",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "perf_event_open",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setdomainname",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "sethostname",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "setns",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "umount",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "umount2",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "unshare",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_BOOT":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "reboot",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_CHROOT":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "chroot",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_MODULE":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "delete_module",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "init_module",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "finit_module",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "query_module",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_PACCT":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "acct",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_PTRACE":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "kcmp",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "process_vm_readv",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "process_vm_writev",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ptrace",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_RAWIO":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "iopl",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "ioperm",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_TIME":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "settimeofday",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "stime",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- {
|
|
|
- Name: "adjtimex",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- case "CAP_SYS_TTY_CONFIG":
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "vhangup",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{},
|
|
|
- },
|
|
|
- }...)
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if !capSysAdmin {
|
|
|
- syscalls = append(syscalls, []*types.Syscall{
|
|
|
- {
|
|
|
- Name: "clone",
|
|
|
- Action: types.ActAllow,
|
|
|
- Args: []*types.Arg{
|
|
|
- {
|
|
|
- Index: sysCloneFlagsIndex,
|
|
|
- Value: syscall.CLONE_NEWNS | syscall.CLONE_NEWUTS | syscall.CLONE_NEWIPC | syscall.CLONE_NEWUSER | syscall.CLONE_NEWPID | syscall.CLONE_NEWNET,
|
|
|
- ValueTwo: 0,
|
|
|
- Op: types.OpMaskedEqual,
|
|
|
- },
|
|
|
- },
|
|
|
- },
|
|
|
- }...)
|
|
|
}
|
|
|
|
|
|
return &types.Seccomp{
|
|
|
DefaultAction: types.ActErrno,
|
|
|
- Architectures: arches(),
|
|
|
+ ArchMap: arches(),
|
|
|
Syscalls: syscalls,
|
|
|
}
|
|
|
}
|