@@ -105,7 +105,7 @@ resulting profile. Those are used by the OCI runtime (like [runc][runc] or
105
105
[ crun] [ crun ] ) in order to be able to run a container. This means that ` spoc `
106
106
can be used to record seccomp profiles which then can be containerized directly.
107
107
This behavior can be disabled in ` spoc ` by using the ` --no-base-syscalls ` /` -n `
108
- or customized via the ` --base-syscalls ` /` -b ` command line flags This can be
108
+ or customized via the ` --base-syscalls ` /` -b ` command line flags. This can be
109
109
helpful in cases where different OCI runtimes other than crun and runc are used,
110
110
or if I just want to record the seccomp profile for the application and stack
111
111
it with another [ base profile] [ base ] .
@@ -154,7 +154,7 @@ together with the Security Profiles Operator for managing it within Kubernetes.
154
154
52.628827 Wrote seccomp profile to: /tmp/profile.json
155
155
` ` `
156
156
157
- ```
157
+ ` ` ` console
158
158
> jq . /tmp/profile.json
159
159
` ` `
160
160
@@ -216,7 +216,7 @@ example, I could remove the allowed `uname` syscall:
216
216
217
217
And then try to run it again with the new profile `/tmp/no-uname-profile.json` :
218
218
219
- ```
219
+ ` ` ` console
220
220
> sudo ./spoc run -p /tmp/no-uname-profile.json ./main
221
221
10:39:12.707798 Reading file /tmp/no-uname-profile.json
222
222
10:39:12.707892 Setting up seccomp
@@ -250,7 +250,7 @@ to `SCMP_ACT_LOG` like this:
250
250
Then the log enricher will give us a hint that the `uname` syscall got blocked
251
251
when using `spoc run` :
252
252
253
- ```
253
+ ` ` ` console
254
254
> sudo ./spoc run -p /tmp/no-uname-profile-log.json ./main
255
255
10:48:07.470126 Reading file /tmp/no-uname-profile-log.json
256
256
10:48:07.470234 Setting up seccomp
0 commit comments