diff --git a/src/seccomp/policy/DefaultPolicy.cc b/src/seccomp/policy/DefaultPolicy.cc index 3695089..be8e9b6 100644 --- a/src/seccomp/policy/DefaultPolicy.cc +++ b/src/seccomp/policy/DefaultPolicy.cc @@ -103,13 +103,19 @@ void DefaultPolicy::addExecutionControlRules(bool allowFork) { void DefaultPolicy::addMemoryManagementRules() { allowSyscalls( {"brk", - "mmap", - "mmap2", "munmap", "mremap", "mprotect", "arch_prctl"}); + // Allow mmap and mmap2 only on fd >= 3 + for (const auto& syscall: {"mmap", "mmap2"}) { + rules_.emplace_back(SeccompRule( + syscall, + action::ActionAllow(), + filter::SyscallArg(4) >= 3)); + } + rules_.emplace_back(SeccompRule{"madvise", action::ActionErrno{EINVAL}}); } @@ -128,11 +134,19 @@ void DefaultPolicy::addInputOutputRules() { syscall, action::ActionAllow(), filter::SyscallArg(0) > 0)); } + // Allow dup only on fd >= 3 rules_.emplace_back(SeccompRule( - "dup2", action::ActionAllow(), filter::SyscallArg(1) >= 3)); + "dup", action::ActionAllow(), filter::SyscallArg(0) >= 3)); + for (const auto& syscall: {"dup2", "dup3"}) { + rules_.emplace_back(SeccompRule( + syscall, + action::ActionAllow(), + filter::SyscallArg(0) >= 3 && + filter::SyscallArg(1) >= 3)); + } // Allow reading from any file descriptor - allowSyscalls({"read", "readv", "dup", "fcntl", "fcntl64", "pread64"}); + allowSyscalls({"read", "readv", "fcntl", "fcntl64", "pread64"}); rules_.emplace_back(SeccompRule("ioctl", action::ActionErrno(ENOTTY)));