Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

go/runtime/host/sandbox/process: Seccomp policy generation fails on systems with prehistoric garbage #4861

Closed
Yawning opened this issue Jul 25, 2022 · 0 comments · Fixed by #4862
Labels
c:bug Category: bug

Comments

@Yawning
Copy link
Contributor

Yawning commented Jul 25, 2022

"Amazon Linux" ships kernel 4.14.x, along with a horrifically prehistoric userland, from back when computers were vacuum tube based, and paper-tape was considered a reasonable storage medium. As a consequence the seccomp policy generation fails because libseccomp has no idea what clone3 is, as it was added in 5.3.

Failing to add the handers for clone3 should not be fatal, unless the system-call should exist on the system.

	clone3ID, err := seccomp.GetSyscallFromName("clone3")
	if err != nil {
		return err
	}
	err = filter.AddRule(clone3ID, seccomp.ActErrno.SetReturnCode(int16(syscall.ENOSYS)))
	if err != nil {
		return err
	}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:bug Category: bug
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant