add more syscalls to seccomp whitelists.

This commit is contained in:
Joris Vink 2023-04-06 09:33:48 +02:00
parent 4974a769d4
commit 208b0e868f
3 changed files with 18 additions and 0 deletions

View File

@ -112,6 +112,12 @@ static struct sock_filter filter_acme[] = {
KORE_SYSCALL_ALLOW(clone),
KORE_SYSCALL_ALLOW(membarrier),
KORE_SYSCALL_ALLOW(set_robust_list),
#if defined(SYS_clone3)
KORE_SYSCALL_ALLOW(clone3),
#endif
#if defined(SYS_rseq)
KORE_SYSCALL_ALLOW(rseq),
#endif
};
#endif

View File

@ -40,6 +40,12 @@ static struct sock_filter filter_curl[] = {
/* Threading related. */
KORE_SYSCALL_ALLOW(clone),
KORE_SYSCALL_ALLOW(set_robust_list),
#if defined(SYS_clone3)
KORE_SYSCALL_ALLOW(clone3),
#endif
#if defined(SYS_rseq)
KORE_SYSCALL_ALLOW(rseq),
#endif
/* Other */
KORE_SYSCALL_ALLOW(uname),

View File

@ -33,6 +33,12 @@ static struct sock_filter filter_task[] = {
KORE_SYSCALL_ALLOW(clone),
KORE_SYSCALL_ALLOW(socketpair),
KORE_SYSCALL_ALLOW(set_robust_list),
#if defined(SYS_clone3)
KORE_SYSCALL_ALLOW(clone3),
#endif
#if defined(SYS_rseq)
KORE_SYSCALL_ALLOW(rseq),
#endif
};
#endif