-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
libbeat/common/seccomp: provide default policy for linux arm64 #27955
Conversation
This pull request doesn't have a |
cf100d6
to
c7ea2e1
Compare
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
Trends 🧪💚 Flaky test reportTests succeeded. Expand to view the summary
Test stats 🧪
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
It's worth noting that clone is in the whitelist for amd64 and 386
IIRC I think we would have allowed only certain clone
flags if we had that ability in our generated seccomp filters. But we didn't have argument filtering in go-seccomp-bpf.
* upstream/master: (658 commits) Add complete k8s metadata through composable provider (elastic#27691) Revert "Fix issue where --insecure didn't propogate to Fleet Server ES connection (elastic#27969)" (elastic#27997) Remove deprecated kafka fields (elastic#27938) [Filebeat] Add Base64 encoded HMAC & UUID template functions to httpjson input (elastic#27873) Improve httpjson template function join (elastic#27996) Remove kubernetes.container.image alias (elastic#27898) [Elastic Agent] Golden files for program tests (elastic#27862) [Elastic Agent] Disable modules.d in metricbeat (elastic#27860) libbeat/common/seccomp: provide default policy for linux arm64 (elastic#27955) Fix logger statement in aws-s3 input (elastic#27982) Fix wrong merge (elastic#27976) Fix issue where --insecure didn't propogate to Fleet Server ES connection (elastic#27969) Forward-port 7.14.2 changelog to master (elastic#27975) [Filebeat] Removing duplicate modules (aliases) Observability (elastic#27919) Fix path in vagrant windows script (elastic#27966) [Filebeat] Removing duplicate modules (aliases) and Cyberark (elastic#27915) No changelog for 8.0.0-alpha2 (elastic#27961) Add write access to 'url.value' from 'request.transforms'. (elastic#27937) Docker: remove deprecated fields (elastic#27933) Filebeat: Make all filesets disabled in default configuration (elastic#27762) ...
(cherry picked from commit 01bd66d)
… (#28922) (cherry picked from commit 01bd66d) Co-authored-by: Dan Kortschak <[email protected]>
What does this PR do?
This change adds a default seccomp policy for GOOS=linux GOARCH=arm64.
Why is it important?
Arm64 is an increasingly important target, so adding seccomp protection to that arch is a valuable addition.
Checklist
- [ ] I have made corresponding changes to the documentation- [ ] I have made corresponding change to the default configuration files- [ ] I have added tests that prove my fix is effective or that my feature worksCHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.Author's Checklist
Note that unlike GOARCH!=arm64 arm64 does not have fork or vfork syscalls. However, Go's fork exec does not use fork(2) from what I can see, rather using clone(2) https://linux.die.net/man/2/clone. Perhaps clone should be added to this and the arm policy? (It's worth noting that clone is in the whitelist for amd64 and 386).
How to test this PR locally
Standard testing.
Related issues
N/A
Use cases
N/A
Screenshots
N/A
Logs
N/A