-
Notifications
You must be signed in to change notification settings - Fork 584
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
audit.log did not print when --seccomp-error-action is EPERM #3498
Comments
This is expected AFAIK. PR for the kill-> EPERM change: #3301 |
I want to use |
I'm no expert, but I would think it's possible. @topimiettinen can say more.
I see your point. However, keep in mind that the reason for the change (kill->EPERM) was to block syscalls while allowing the application to continue to work. i.e. audit-logs can be "false-positives", which don't need to be allowed. Which in turn can result in a lot of audit-spam. |
I think this is fine. My usecase is running untrusted user code inside firejail. And need to return a nice user error back when seccomp rule is violated. So application continues runnning just to report error back and stop, which won't spam the audit.log. If you don't want audit logging to be default behavior, is it possible to add an option for that? |
You may need to edit auditd configuration to enable logging for failed system calls. Something like this (taken from
But this also means that it also logs every time an unrelated program gets these errors, so logs may fill up quickly. Maybe you could use instead a rare error code like ENAVAIL ("No XENIX semaphores available", lol) like |
When a system call is violated, and error action is
kill
, I can see audit.log has an entry indicating the errorand
However, when the
--seccomp-error-action=EPERM
, the audit.log did not have an entry.I also checked
And it seems that
errno
should be logged. Maybe there is a flag that should be added when configuringseccomp
?The text was updated successfully, but these errors were encountered: