Skip to content

Conversation

taylorsilva
Copy link
Member

Changes proposed by this PR

Related to #9147

Fixes the issue we found on workers running on v5 of the linux kernel. When running curl we'd see getaddrinfo() thread failed to start.

The seccomp profile now has clone3 always returning ENOSYS which glibc uses to know it should fallback to regular clone.

Release Note

  • Update seccomp profile to be in sync with Docker/Containerd's default profiles

* Removed duplicate utimes
* Add additional syscalls, matching what Docker/Containerd allow.
  Source: https://github.com/containerd/containerd/blob/main/contrib/seccomp/seccomp_default.go
* Refactored the list of Syscalls by not using the AllowSyscall() func.
  This was a carry-over from following Garden/Guardian's implementation.
  I personally find it easier to manage the list of syscalls directly in
  the specs.LinuxSyscall struct. I left the syscalls that we specify
  args for as-is since I think the call to AllowSyscall() does make them
  easier to read.
* Added clone3 and have it always returning ENOSYS, which is how users
  of it know to fallback to clone. See
  [here](containerd/containerd#5982) and
  [here](moby/moby#42681) for details

Signed-off-by: Taylor Silva <dev@taydev.net>
Signed-off-by: Taylor Silva <dev@taydev.net>
@taylorsilva taylorsilva requested a review from a team as a code owner April 1, 2025 17:54
Signed-off-by: Taylor Silva <dev@taydev.net>
@taylorsilva taylorsilva merged commit 8e1775d into master Apr 1, 2025
12 checks passed
@taylorsilva taylorsilva deleted the seccomp-update branch April 1, 2025 21:26
Names: []string{"clone3"},
Action: specs.ActErrno,
ErrnoRet: &enosys,
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

so it's not just allowing clone3 that would work?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants