Skip to content
This repository has been archived by the owner on May 12, 2021. It is now read-only.

Commit

Permalink
virtcontainers: Conditionally pass seccomp profile
Browse files Browse the repository at this point in the history
Pass Seccomp profile to the agent only if
the configuration.toml allows it to be passed
and the agent/image is seccomp capable.

Fixes: #688

Signed-off-by: Nitesh Konkar niteshkonkar@in.ibm.com
  • Loading branch information
nitkon committed Dec 5, 2018
1 parent 0a7a437 commit ae49101
Show file tree
Hide file tree
Showing 8 changed files with 57 additions and 23 deletions.
5 changes: 5 additions & 0 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,9 @@ DEFMEMSLOTS := 10
DEFBRIDGES := 1
#Default network model
DEFNETWORKMODEL := macvtap

DEFDISABLEGUESTSECCOMP := true

#Default entropy source
DEFENTROPYSOURCE := /dev/urandom

Expand Down Expand Up @@ -223,6 +226,7 @@ USER_VARS += DEFMEMSZ
USER_VARS += DEFMEMSLOTS
USER_VARS += DEFBRIDGES
USER_VARS += DEFNETWORKMODEL
USER_VARS += DEFDISABLEGUESTSECCOMP
USER_VARS += DEFDISABLEBLOCK
USER_VARS += DEFBLOCKSTORAGEDRIVER
USER_VARS += DEFENABLEIOTHREADS
Expand Down Expand Up @@ -392,6 +396,7 @@ $(GENERATED_FILES): %: %.in Makefile VERSION
-e "s|@DEFMEMSLOTS@|$(DEFMEMSLOTS)|g" \
-e "s|@DEFBRIDGES@|$(DEFBRIDGES)|g" \
-e "s|@DEFNETWORKMODEL@|$(DEFNETWORKMODEL)|g" \
-e "s|@DEFDISABLEGUESTSECCOMP@|$(DEFDISABLEGUESTSECCOMP)|g" \
-e "s|@DEFDISABLEBLOCK@|$(DEFDISABLEBLOCK)|g" \
-e "s|@DEFBLOCKSTORAGEDRIVER@|$(DEFBLOCKSTORAGEDRIVER)|g" \
-e "s|@DEFENABLEIOTHREADS@|$(DEFENABLEIOTHREADS)|g" \
Expand Down
7 changes: 7 additions & 0 deletions cli/config/configuration.toml.in
Original file line number Diff line number Diff line change
Expand Up @@ -259,6 +259,13 @@ path = "@NETMONPATH@"
#
internetworking_model="@DEFNETWORKMODEL@"

# disable guest seccomp
# Determines whether container seccomp profiles are passed to the virtual
# machine and applied by the kata agent. If set to true, seccomp is not applied
# within the guest
# (default: true)
disable_guest_seccomp=@DEFDISABLEGUESTSECCOMP@

# If enabled, the runtime will create opentracing.io traces and spans.
# (See https://www.jaegertracing.io/docs/getting-started).
# (default: disabled)
Expand Down
26 changes: 14 additions & 12 deletions cli/kata-env.go
Original file line number Diff line number Diff line change
Expand Up @@ -63,12 +63,13 @@ type RuntimeConfigInfo struct {

// RuntimeInfo stores runtime details.
type RuntimeInfo struct {
Version RuntimeVersionInfo
Config RuntimeConfigInfo
Debug bool
Trace bool
DisableNewNetNs bool
Path string
Version RuntimeVersionInfo
Config RuntimeConfigInfo
Debug bool
Trace bool
DisableGuestSeccomp bool
DisableNewNetNs bool
Path string
}

// RuntimeVersionInfo stores details of the runtime version
Expand Down Expand Up @@ -174,12 +175,13 @@ func getRuntimeInfo(configFile string, config oci.RuntimeConfig) RuntimeInfo {
runtimePath, _ := os.Executable()

return RuntimeInfo{
Debug: config.Debug,
Trace: config.Trace,
Version: runtimeVersion,
Config: runtimeConfig,
Path: runtimePath,
DisableNewNetNs: config.DisableNewNetNs,
Debug: config.Debug,
Trace: config.Trace,
Version: runtimeVersion,
Config: runtimeConfig,
Path: runtimePath,
DisableNewNetNs: config.DisableNewNetNs,
DisableGuestSeccomp: config.DisableGuestSeccomp,
}
}

Expand Down
11 changes: 7 additions & 4 deletions pkg/katautils/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -114,10 +114,11 @@ type proxy struct {
}

type runtime struct {
Debug bool `toml:"enable_debug"`
Tracing bool `toml:"enable_tracing"`
DisableNewNetNs bool `toml:"disable_new_netns"`
InterNetworkModel string `toml:"internetworking_model"`
Debug bool `toml:"enable_debug"`
Tracing bool `toml:"enable_tracing"`
DisableNewNetNs bool `toml:"disable_new_netns"`
DisableGuestSeccomp bool `toml:"disable_guest_seccomp"`
InterNetworkModel string `toml:"internetworking_model"`
}

type shim struct {
Expand Down Expand Up @@ -651,6 +652,8 @@ func LoadConfiguration(configPath string, ignoreLogging, builtIn bool) (resolved
return "", config, err
}

config.DisableGuestSeccomp = tomlConf.Runtime.DisableGuestSeccomp

// use no proxy if HypervisorConfig.UseVSock is true
if config.HypervisorConfig.UseVSock {
kataUtilsLogger.Info("VSOCK supported, configure to not use proxy")
Expand Down
22 changes: 16 additions & 6 deletions virtcontainers/kata_agent.go
Original file line number Diff line number Diff line change
Expand Up @@ -720,16 +720,17 @@ func (k *kataAgent) replaceOCIMountsForStorages(spec *specs.Spec, volumeStorages
return nil
}

func constraintGRPCSpec(grpcSpec *grpc.Spec, systemdCgroup bool) {
func constraintGRPCSpec(grpcSpec *grpc.Spec, systemdCgroup bool, passSeccomp bool) {
// Disable Hooks since they have been handled on the host and there is
// no reason to send them to the agent. It would make no sense to try
// to apply them on the guest.
grpcSpec.Hooks = nil

// Disable Seccomp since they cannot be handled properly by the agent
// until we provide a guest image with libseccomp support. More details
// here: https://github.com/kata-containers/agent/issues/104
grpcSpec.Linux.Seccomp = nil
// Pass seccomp only if disable_guest_seccomp is set to false in
// configuration.toml and guest image is seccomp capable.
if passSeccomp == true {
grpcSpec.Linux.Seccomp = nil
}

// By now only CPU constraints are supported
// Issue: https://github.com/kata-containers/runtime/issues/158
Expand Down Expand Up @@ -986,9 +987,18 @@ func (k *kataAgent) createContainer(sandbox *Sandbox, c *Container) (p *Process,
return nil, err
}

request := &grpc.GuestDetailsRequest{
MemBlockSize: true,
}

// passSeccomp only if disable_guest_seccomp is set to false in configuration.toml and
// agent/image is seccomp-capable.
guestDetails, err := k.getGuestDetails(request)
passSeccomp := sandbox.config.DisableGuestSeccomp && guestDetails.AgentDetails.SupportsSeccomp

// We need to constraint the spec to make sure we're not passing
// irrelevant information to the agent.
constraintGRPCSpec(grpcSpec, sandbox.config.SystemdCgroup)
constraintGRPCSpec(grpcSpec, sandbox.config.SystemdCgroup, passSeccomp)

k.handleShm(grpcSpec, sandbox)

Expand Down
2 changes: 1 addition & 1 deletion virtcontainers/kata_agent_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -455,7 +455,7 @@ func TestConstraintGRPCSpec(t *testing.T) {
},
}

constraintGRPCSpec(g, true)
constraintGRPCSpec(g, true, true)

// check nil fields
assert.Nil(g.Hooks)
Expand Down
5 changes: 5 additions & 0 deletions virtcontainers/pkg/oci/utils.go
Original file line number Diff line number Diff line change
Expand Up @@ -123,6 +123,9 @@ type RuntimeConfig struct {
Debug bool
Trace bool

//Determines if seccomp should be applied inside guest
DisableGuestSeccomp bool

//Determines if create a netns for hypervisor process
DisableNewNetNs bool
}
Expand Down Expand Up @@ -490,6 +493,8 @@ func SandboxConfig(ocispec CompatOCISpec, runtime RuntimeConfig, bundlePath, cid
ShmSize: shmSize,

SystemdCgroup: systemdCgroup,

DisableGuestSeccomp: runtime.DisableGuestSeccomp,
}

addAssetAnnotations(ocispec, &sandboxConfig)
Expand Down
2 changes: 2 additions & 0 deletions virtcontainers/sandbox.go
Original file line number Diff line number Diff line change
Expand Up @@ -359,6 +359,8 @@ type SandboxConfig struct {

// SystemdCgroup enables systemd cgroup support
SystemdCgroup bool

DisableGuestSeccomp bool
}

func (s *Sandbox) trace(name string) (opentracing.Span, context.Context) {
Expand Down

0 comments on commit ae49101

Please sign in to comment.