amazon-eks-ami
amazon-eks-ami copied to clipboard
seccomp profile not works for syscalls 435 439
What happened: The syscalls in the seccomp did not be allowed to use in pod. We are using playwright to crawl website and I followed the instruction, to create seccomp profile and apply to the pod. It works in our legacy environment AWS Region: us-west-2 Kubernetes Version: 1.21 EKS Version: eks.20 Instance Type: r5.large AMI: amazon-eks-node-1.21-v20220406
After upgraded the cluster to 1.27 and amazon-eks-node-1.27-v20230816
AMI, there are three types of syscalls show in audit.log
type=SECCOMP msg=audit(1692609701.878:800): auid=4294967295 uid=1001 gid=1001 ses=4294967295 pid=768 comm="node" exe="/venv/lib/python3.10/site-packages/playwright/driver/node" sig=0 arch=c000003e syscall=330 compat=0 ip=0x7effec06211b code=0x7ffc0000
type=SECCOMP msg=audit(1692605223.072:587): auid=4294967295 uid=1001 gid=1001 ses=4294967295 pid=16630 comm="scrapy" exe="/usr/bin/python3.10" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7f03f7a4d9ed code=0x7ffc0000
type=SECCOMP msg=audit(1692605179.452:515): auid=4294967295 uid=1001 gid=1001 ses=4294967295 pid=16777 comm="ldd" exe="/usr/bin/bash" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7f8b628d7ca4 code=0x7ffc0000
According to the syscalls table
I added
330 pkey_alloc
435 clone3
439 faccessat2
into seccomp profile, but only the 330 audit log is gone.
What you expected to happen:
seccomp profile should work for new syscalls 435 439, so I can change the action to SCMP_ACT_ERRNO
.
How to reproduce it (as minimally and precisely as possible):
- Create the same EKS environment like below
- Create the seccomp profile in the node
- Apply the example pod into cluster.
- The pod will turn into error state.(cannot create a new thread)
Anything else we need to know?:
Environment
- AWS Region: us-west-2
- Instance Type(s): r5.xlarge
- EKS Platform version: eks.4
- Kubernetes version: 1.27
- AMI Version: amazon-eks-node-1.27-v20230816
- Kernel (e.g.
uname -a
): 5.10.186-179.751.amzn2.x86_64 - Release information (run
cat /etc/eks/release
on a node):
BASE_AMI_ID="ami-0a6c4ce5a4a59e9e2"
BUILD_TIME="Wed Aug 16 02:57:51 UTC 2023"
BUILD_KERNEL="5.10.186-179.751.amzn2.x86_64"
ARCH="x86_64"