Skip to content
This repository has been archived by the owner on Aug 14, 2020. It is now read-only.

[WIP] ace: initial seccomp proposal #620

Closed
wants to merge 1 commit into from

Conversation

lucab
Copy link
Contributor

@lucab lucab commented May 31, 2016

WORK IN PROGRESS

An initial proposal for seccomp support as an ACE Linux-specific isolator.

@jonboulle
Copy link
Contributor

Looks fantastic!

@lucab
Copy link
Contributor Author

lucab commented May 31, 2016

This also captures some prior offline discussions with @s-urbaniak, which may want to chime in to double-check.


l.val = v

return err
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

return nil, err cannot be non-nil here

@s-urbaniak
Copy link
Contributor

s-urbaniak commented Jun 1, 2016

@lucab just nits really :-)

As far as I remember we discussed that the seccomp filter doesn't really make sense used without the NoNewPrivileges isolator. Is this something we should document/code?

@lucab
Copy link
Contributor Author

lucab commented Jun 1, 2016

@s-urbaniak yes, in the bigger picture there is some relationship between seccomp, capabilities and no-new-privs to avoid unprivileged user re-gaining enough privileges (CAP_SYS_ADMIN) to revert the filter. But I don't think this should be part of the spec (or maybe just a "MAY" note).

@lucab
Copy link
Contributor Author

lucab commented Jun 1, 2016

I'll let this sediment this here for some time, waiting for major concerns on the spec side. I'll then move it to non-wip with a final refinement pass.

@lucab
Copy link
Contributor Author

lucab commented Jun 2, 2016

Moved to proposal stage, spec and code now at #621.

@lucab lucab closed this Jun 2, 2016
"errno": "ENOTSUP",
"set": [
"chown",
"chmod"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we give an example with some syscalls that should reasonably not be given to containers, so that it is more realistic? Such as:

  • reboot
  • init_module, finit_module, delete_module
  • kexec_load

Some of them found from systemd-nspawn.

Copy link
Contributor Author

@lucab lucab Jun 2, 2016

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it will make sense, yes. Another source for examples is Docker blacklist.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants