containerd/contrib/seccomp
Sebastiaan van Stijn e1445dff12
profiles: seccomp: update to Linux 5.11 syscall list
These syscalls (some of which have been in Linux for a while but were
missing from the profile) fall into a few buckets:

 * close_range(2), epoll_wait2(2) are just extensions of existing "safe
   for everyone" syscalls.

 * The mountv2 API syscalls (fs*(2), move_mount(2), open_tree(2)) are
   all equivalent to aspects of mount(2) and thus go into the
   CAP_SYS_ADMIN category.

 * process_madvise(2) is similar to the other process_*(2) syscalls and
   thus goes in the CAP_SYS_PTRACE category.

Co-authored-by: Aleksa Sarai <asarai@suse.de>
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-01-21 21:30:25 +01:00
..
seccomp_default_unsupported.go Update usage of whitelist in project 2020-06-08 12:49:22 -05:00
seccomp_default.go profiles: seccomp: update to Linux 5.11 syscall list 2021-01-21 21:30:25 +01:00
seccomp.go Add --seccomp flag to ctr 2019-08-29 13:02:21 -04:00