Skip to content

Conversation

@lifubang
Copy link
Member

test #5007
Although we need more information in #5007, we can already confirm that there may be a bug in syscall compatibility after seccomp enforcement.

@lifubang
Copy link
Member Author

As expected, the following error was observed:

not ok 267 runc run [seccomp] (verify syscall compatibility after seccomp enforcement)
# (in test file tests/integration/seccomp.bats, line 199)
#   `[ "$status" -eq 0 ]' failed
# runc spec (status=0)
#
# runc run test_busybox (status=1)
# time="2025-11-14T03:57:40Z" level=error msg="runc run failed: unable to start container process: error during container init: error closing exec fds: get handle to /proc/thread-self/fd: unsafe procfs detected: openat2 fsmount:fscontext:proc/thread-self/fd/: function not implemented"
# --- teardown ---

@lifubang
Copy link
Member Author

However, I don’t believe the high-level runtime would set this seccomp configuration: "errnoRet": 38.

@cyphar
Copy link
Member

cyphar commented Nov 14, 2025

Well, we actually would prefer higher-level runtimes to set defaultErrno to be 38 (podman does this). See moby/moby#42871 and the surrounding issues.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants