From 2cddd1cd1f3135f36f6afcc84ddfda904aeee3b5 Mon Sep 17 00:00:00 2001 From: Sebastiaan van Stijn Date: Wed, 11 May 2016 18:45:27 +0200 Subject: [PATCH] docs: update seccomp whitelist the 'modify_ldt' was listed as "blocked by default", but was whitelisted in 13a9d4e8993997b2bf9be7e96a8d7978a73d0b9b this updates the documentation to reflect this Signed-off-by: Sebastiaan van Stijn --- docs/security/seccomp.md | 1 - 1 file changed, 1 deletion(-) diff --git a/docs/security/seccomp.md b/docs/security/seccomp.md index 5f3dea6f15..26a72293ae 100644 --- a/docs/security/seccomp.md +++ b/docs/security/seccomp.md @@ -99,7 +99,6 @@ the reason each syscall is blocked rather than white-listed. | `keyctl` | Prevent containers from using the kernel keyring, which is not namespaced. | | `lookup_dcookie` | Tracing/profiling syscall, which could leak a lot of information on the host. | | `mbind` | Syscall that modifies kernel memory and NUMA settings. Already gated by `CAP_SYS_NICE`. | -| `modify_ldt` | Old syscall only used in 16-bit code and a potential information leak. | | `mount` | Deny mounting, already gated by `CAP_SYS_ADMIN`. | | `move_pages` | Syscall that modifies kernel memory and NUMA settings. | | `name_to_handle_at` | Sister syscall to `open_by_handle_at`. Already gated by `CAP_SYS_NICE`. |