kafel
kafel copied to clipboard
nsjail requires listing it's own syscalls
Currently I find myself needing to define a base policy for any executables I run:
//
// Kafel policy to allow nsjail a few syscalls to launch the executable.
//
POLICY NsJail {
ALLOW {
execve,
prctl,
prlimit64
}
}
Otherwise I am getting audit messages like this:
type=SECCOMP msg=audit(1714125050.685:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=12366 comm="nsjail" exe="/usr/bin/nsjail" sig=31 arch=c000003e syscall=59 compat=0 ip=0x7f6dcd26b55b code=0x0AUID="unset" UID="root" GID="root" ARCH=x86_64 SYSCALL=execve
It seems to me that intuitively, nsjail should not apply the seccomp rules to itself, but only to the child, sandboxed process.