Skip to content

Conversation

@lifubang
Copy link
Member

@lifubang lifubang commented Nov 14, 2025

(This PR requires #5026.)

test #5007
Although we need more information in #5007, we can already confirm that there may be a bug in syscall compatibility after seccomp enforcement.

@lifubang
Copy link
Member Author

As expected, the following error was observed:

not ok 267 runc run [seccomp] (verify syscall compatibility after seccomp enforcement)
# (in test file tests/integration/seccomp.bats, line 199)
#   `[ "$status" -eq 0 ]' failed
# runc spec (status=0)
#
# runc run test_busybox (status=1)
# time="2025-11-14T03:57:40Z" level=error msg="runc run failed: unable to start container process: error during container init: error closing exec fds: get handle to /proc/thread-self/fd: unsafe procfs detected: openat2 fsmount:fscontext:proc/thread-self/fd/: function not implemented"
# --- teardown ---

@lifubang
Copy link
Member Author

However, I don’t believe the high-level runtime would set this seccomp configuration: "errnoRet": 38.

@cyphar
Copy link
Member

cyphar commented Nov 14, 2025

Well, we actually would prefer higher-level runtimes to set defaultErrno to be 38 (podman does this). See moby/moby#42871 and the surrounding issues.

@cyphar
Copy link
Member

cyphar commented Nov 20, 2025

This requires the filepath-securejoin update from #5026 as well.

@lifubang
Copy link
Member Author

This requires the filepath-securejoin update from #5026 as well.

I think we can include this PR in #5026. WDYT?

@cyphar
Copy link
Member

cyphar commented Nov 20, 2025

Yeah that's probably easiest solution. Thanks @lifubang.

@lifubang
Copy link
Member Author

Close via #5026

@lifubang lifubang closed this Nov 20, 2025
@lifubang lifubang removed this from the 1.3.4 milestone Nov 26, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants