io_uring and seccomp

Date: 10/13/2024 · Tags: #system-programming

Till now I just known that io_uring is not enabled by default while using container (in the past day XD).

A side effect is that io_uring effectively bypasses the protections provided by seccomp filtering — we can't filter out syscalls we never make! This isn't a security vulnerability per se, but something you should keep in mind if you have especially paranoid seccomp rules. 1

Fortunately, moby and containerd have already added allow list for io_uring in seccomp filters. 23

But @tgross still suggest to to check up on if you're expecting seccomp filtering to harden your applications.

Footnotes

  1. io_uring and seccomp | 0x74696d

  2. seccomp: whitelist io-uring related system calls #39415

  3. seccomp: allow io-uring related system calls #4493