Skip to content

Commit 73a35de

Browse files
neersightedbartier
andcommitted
seccomp: always allow name_to_handle_at
This syscall is used by systemd to request unique internal names for paths in the cgroup hierarchy from the kernel, and is overall innocuous. Due to [previous][1] [mistakes][2] in moby/moby, it ended up attached to `CAP_SYS_ADMIN`; however, it should not be filtered at all. An in-depth analysis is available [at moby/moby][3]. [1]: moby/moby@a01c4dc#diff-6c0d906dbef148d2060ed71a7461907e5601fea78866e4183835c60e5d2ff01aR1627-R1639 [2]: moby/moby@c1ca124 [3]: moby/moby#45766 (review) Co-authored-by: Vitor Anjos <[email protected]> Signed-off-by: Bjorn Neergaard <[email protected]>
1 parent 9b4ed8a commit 73a35de

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

contrib/seccomp/seccomp_default.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -585,7 +585,6 @@ func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
585585
"mount",
586586
"mount_setattr",
587587
"move_mount",
588-
"name_to_handle_at",
589588
"open_tree",
590589
"perf_event_open",
591590
"quotactl",

0 commit comments

Comments
 (0)