mirror of https://github.com/docker/docs.git
Block bpf syscall from default seccomp profile
The bpf syscall can load code into the kernel which may persist beyond container lifecycle. Requires CAP_SYS_ADMIN already. Signed-off-by: Justin Cormack <justin.cormack@unikernel.com>
This commit is contained in:
parent
eb551baf6f
commit
33568405f3
|
@ -28,6 +28,13 @@ var defaultSeccompProfile = &configs.Seccomp{
|
||||||
Action: configs.Errno,
|
Action: configs.Errno,
|
||||||
Args: []*configs.Arg{},
|
Args: []*configs.Arg{},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
// Deny loading potentially persistent bpf programs into kernel
|
||||||
|
// already gated by CAP_SYS_ADMIN
|
||||||
|
Name: "bpf",
|
||||||
|
Action: configs.Errno,
|
||||||
|
Args: []*configs.Arg{},
|
||||||
|
},
|
||||||
{
|
{
|
||||||
// Time/Date is not namespaced
|
// Time/Date is not namespaced
|
||||||
Name: "clock_settime",
|
Name: "clock_settime",
|
||||||
|
|
Loading…
Reference in New Issue