Browse Source

seccomp: add support for Landlock syscalls in default policy

This commit allows the Landlock[0] system calls in the default seccomp
policy.

Landlock was introduced in kernel 5.13, to fill the gap that inspecting
filepaths passed as arguments to filesystem system calls is not really
possible with pure `seccomp` (unless involving `ptrace`).

Allowing Landlock by default fits in with allowing `seccomp` for
containerized applications to voluntarily restrict their access rights
to files within the container.

[0]: https://www.kernel.org/doc/html/latest/userspace-api/landlock.html

Signed-off-by: Tudor Brindus <me@tbrindus.ca>
Tudor Brindus 3 years ago
parent
commit
af819bf623
2 changed files with 6 additions and 0 deletions
  1. 3 0
      profiles/seccomp/default.json
  2. 3 0
      profiles/seccomp/default_linux.go

+ 3 - 0
profiles/seccomp/default.json

@@ -183,6 +183,9 @@
 				"io_uring_setup",
 				"io_uring_setup",
 				"ipc",
 				"ipc",
 				"kill",
 				"kill",
+				"landlock_add_rule",
+				"landlock_create_ruleset",
+				"landlock_restrict_self",
 				"lchown",
 				"lchown",
 				"lchown32",
 				"lchown32",
 				"lgetxattr",
 				"lgetxattr",

+ 3 - 0
profiles/seccomp/default_linux.go

@@ -178,6 +178,9 @@ func DefaultProfile() *Seccomp {
 					"io_uring_setup",
 					"io_uring_setup",
 					"ipc",
 					"ipc",
 					"kill",
 					"kill",
+					"landlock_add_rule",
+					"landlock_create_ruleset",
+					"landlock_restrict_self",
 					"lchown",
 					"lchown",
 					"lchown32",
 					"lchown32",
 					"lgetxattr",
 					"lgetxattr",