@@ -367,7 +367,25 @@ profile <profile_name> flags=(attach_disconnected,mediate_deleted) {
367367}
368368```
369369
370- * TODO: seccomp work is being done to find a good default config*
370+ [ seccomp] ( https://en.wikipedia.org/wiki/Seccomp ) can be used to apply filters
371+ to the system calls used in a container. The set of filter expressions allows
372+ you to match against syscall numbers (automatically resolved from syscall
373+ names) and apply various comparison operators to syscall arguments.
374+
375+ When a filter rule matches, the associated action is executed - such as killing
376+ the process or thread, returning an errno value without executing the syscall,
377+ forwarding the request to a user-space agent to handle, emitting a log entry,
378+ or permitting the syscall to execute.
379+
380+ The primary use-case is to provide an explicit allow-list of syscalls for a
381+ container, to reduce the kernel API attack surface exposed to the container.
382+ Historically, seccomp has protected containers against various kernel 0-day
383+ vulnerabilities, so a strong seccomp filter is highly recommended.
384+
385+ libcontainer does not provide a default filter, but higher-level
386+ runtimes tend to define their own filters for use with runc (see
387+ [ oci-runtime-seccomp] ( https://github.com/opencontainers/runtime-spec/blob/v1.2.1/config-linux.md#seccomp )
388+ for more information on how to write your own filters).
371389
372390### Runtime and Init Process
373391
0 commit comments