-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
personality (PER_LINUX|ADDR_NO_RANDOMIZE) not allowed in seccomp.json profile #1662
Comments
@giuseppe thoughts? |
The general idea is to enable as few syscalls as possible to reduce the attack surface. The |
Should we make it easier to add a syscall to the seccomp json file with something like --syscall-add --syscall-drop (Matching --cap-add and --cap-drop) Making it easier for user rather then forcing them to disable seccomp all together. |
Not sure but in this case instead of setting default in I maybe confusing thing but shouldn't we have a different configurable field for Please correct me if i am misunderstanding the issue here. |
I'm not sure if it is adequate to allow it by default, but I've run across a case where setarch -R failed to execute within the seccomp profile. it might be an intentional omission, I couldn't find a related ticket or policy documentation however.
The text was updated successfully, but these errors were encountered: