docker/profiles/seccomp
Justin Cormack dcf2632945 Revert "Block obsolete socket families in the default seccomp profile"
This reverts commit 7e3a596a63.

Unfortunately, it was pointed out in https://github.com/moby/moby/pull/29076#commitcomment-21831387
that the `socketcall` syscall takes a pointer to a struct so it is not possible to
use seccomp profiles to filter it. This means these cannot be blocked as you can
use `socketcall` to call them regardless, as we currently allow 32 bit syscalls.

Users who wish to block these should use a seccomp profile that blocks all
32 bit syscalls and then just block the non socketcall versions.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 14:26:00 +01:00
..
fixtures move default seccomp profile into package 2016-01-21 16:55:29 -08:00
default.json Revert "Block obsolete socket families in the default seccomp profile" 2017-05-09 14:26:00 +01:00
generate.go New seccomp format 2016-09-01 11:53:07 +02:00
seccomp.go Update moby to runc and oci 1.0 runtime final rc 2017-05-05 13:45:45 -07:00
seccomp_default.go Revert "Block obsolete socket families in the default seccomp profile" 2017-05-09 14:26:00 +01:00
seccomp_test.go New seccomp format 2016-09-01 11:53:07 +02:00
seccomp_unsupported.go profiles: seccomp: fix !seccomp build 2017-03-02 21:13:17 +11:00