-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add close_range syscall to default seccomp profile #1262
Comments
Already added in Docker 20.10.4 moby/moby#41971 |
It seems like it is not whitelisted though. This syscall is blocked unless |
@AkihiroSuda do you need a method of testing this locally? |
@thelamer what distro and kernel are you running on? (can you provide output of |
For Docker Info: I guess the real question is can you replicate this using that test image? I have tested on multiple other setups also including some of our CI infrastructure all the same result. Also please reference the information in mviereck/x11docker#346 it has more than I have posted here, seems to affect all new distros with a current vte3 version. |
Looks like this has been fixed upstream by vte3, closing. |
False alarm I re-tested improperly with |
@thaJeztah I also started to delv into alt container tech and found that the default seccomp config with podman this just launches and works on the identical system and software setup, IE:
I am sure there are many underlying differences here, but what I can't figure out is what syscall is being made here by Vte3 that works fine in podman with a stock config and not in Docker unless So I dug deeper and started to pull everything from their default seccomp profile: (formatting looks identical) The problem I ran into is many of the syscalls defined in their config spit back errors like:
After pulling out all the syscalls unknown to docker I spun up the container and hit the same roadblock. So I am beginning to think there is a series of system calls in bleeding edge stuff that Docker might not be aware of or able to whitelist without turning it off completely to gain functionality. In summary there is no versions of a seccomp profile that will ever work I suspect until new syscalls are supported by Docker, but I could be and often am wrong. |
I have a similar issue with These commands also require to use the Besides using the modified seccomp profile, I also added the following capabilities:
However, I could not get it working unless I used Specifically, I cannot allow the following sycalls: 1017 setsockopt(5, SOL_SOCKET, SO_SNDBUFFORCE, [8388608], 4) = -1 EPERM (Operation not permitted)
1029 setsockopt(5, SOL_SOCKET, SO_SNDBUFFORCE, [8388608], 4) = -1 EPERM (Operation not permitted)
1039 close_range(3, 4294967295, CLOSE_RANGE_CLOEXEC) = -1 EPERM (Operation not permitted)
1044 setsockopt(5, SOL_SOCKET, SO_SNDBUFFORCE, [8388608], 4) = -1 EPERM (Operation not permitted) In the end, the issue is the installed version of On Ubuntu 20.04.6 LTS ( This isssue seems to be somewhat known, as @yosifkit write a nice write-up in docker-library/official-images#16829. In my case, I decided to upgrade to Ubuntu 24.04.1 LTS, however, IMHO it would be better for Docker to provide the latest (tested/supported) Related (this is not a finite list): |
Ran into this running latest vte3 (used for launching a bunch of graphical terminals outside of xterm and ultralights)
Some reference:
containers/podman#10337
mviereck/x11docker#346 (comment)
I don't know if this has been considered in the past or if there are any security implications of allowing this by default.
Let me know if you need anymore info.
The text was updated successfully, but these errors were encountered: