virtiofsd: add seccomp whitelist
Only allow system calls that are needed by virtiofsd. All other system calls cause SIGSYS to be directed at the thread and the process will coredump. Restricting system calls reduces the kernel attack surface and limits what the process can do when compromised. Signed-off-by:Stefan Hajnoczi <stefanha@redhat.com> with additional entries by: Signed-off-by:
Ganesh Maharaj Mahalingam <ganesh.mahalingam@intel.com> Signed-off-by:
Masayoshi Mizuma <m.mizuma@jp.fujitsu.com> Signed-off-by:
Misono Tomohiro <misono.tomohiro@jp.fujitsu.com> Signed-off-by:
piaojun <piaojun@huawei.com> Signed-off-by:
Vivek Goyal <vgoyal@redhat.com> Signed-off-by:
Eric Ren <renzhen@linux.alibaba.com> Signed-off-by:
Dr. David Alan Gilbert <dgilbert@redhat.com>
Showing
- Makefile 3 additions, 2 deletionsMakefile
- tools/virtiofsd/Makefile.objs 4 additions, 1 deletiontools/virtiofsd/Makefile.objs
- tools/virtiofsd/passthrough_ll.c 2 additions, 0 deletionstools/virtiofsd/passthrough_ll.c
- tools/virtiofsd/seccomp.c 151 additions, 0 deletionstools/virtiofsd/seccomp.c
- tools/virtiofsd/seccomp.h 14 additions, 0 deletionstools/virtiofsd/seccomp.h
tools/virtiofsd/seccomp.c
0 → 100644
tools/virtiofsd/seccomp.h
0 → 100644
Please register or sign in to comment