diff options
author | Alois Wohlschlager <alois1@gmx-topmail.de> | 2024-07-01 09:18:01 +0200 |
---|---|---|
committer | Alois Wohlschlager <alois1@gmx-topmail.de> | 2024-07-25 18:24:45 +0200 |
commit | e7188e211a5a2ac0ba34635a846569560bb5f000 (patch) | |
tree | 4d42560d44069fb8a4ecc43d983d0c5956302832 /tests/nixos/io_uring/package.nix | |
parent | 127ee1a101e3f5ebab39ad98cbe58fefcd52eca5 (diff) |
libstore/build: block io_uring
Unfortunately, io_uring is totally opaque to seccomp, and while currently there
are no dangerous operations implemented, there is no guarantee that it remains
this way. This means that io_uring should be blocked entirely to ensure that
the sandbox is future-proof. This has not been observed to cause issues in
practice.
Change-Id: I45d3895f95abe1bc103a63969f444c334dbbf50d
Diffstat (limited to 'tests/nixos/io_uring/package.nix')
-rw-r--r-- | tests/nixos/io_uring/package.nix | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/tests/nixos/io_uring/package.nix b/tests/nixos/io_uring/package.nix new file mode 100644 index 000000000..8f980183a --- /dev/null +++ b/tests/nixos/io_uring/package.nix @@ -0,0 +1,19 @@ +{ runCommandCC }: +runCommandCC "io_uring-is-blocked" { } '' + cat > test.c <<EOF + #include <errno.h> + #include <sys/syscall.h> + #include <unistd.h> + + int main() { + int res = syscall(SYS_io_uring_setup, 0, NULL); + return res == -1 && errno == ENOSYS ? 0 : 1; + } + EOF + "$CC" -o test test.c + if ! ./test; then + echo "Oh no! io_uring is available!" + exit 1 + fi + touch "$out" +'' |