profiles: seccomp: allow clock_settime when CAP_SYS_TIME is added
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
This commit is contained in:
parent
58ccdfe00c
commit
3ab4961032
2 changed files with 3 additions and 1 deletions
|
@ -900,7 +900,8 @@
|
||||||
"names": [
|
"names": [
|
||||||
"settimeofday",
|
"settimeofday",
|
||||||
"stime",
|
"stime",
|
||||||
"adjtimex"
|
"adjtimex",
|
||||||
|
"clock_settime"
|
||||||
],
|
],
|
||||||
"action": "SCMP_ACT_ALLOW",
|
"action": "SCMP_ACT_ALLOW",
|
||||||
"args": [],
|
"args": [],
|
||||||
|
|
|
@ -735,6 +735,7 @@ func DefaultProfile() *types.Seccomp {
|
||||||
"settimeofday",
|
"settimeofday",
|
||||||
"stime",
|
"stime",
|
||||||
"adjtimex",
|
"adjtimex",
|
||||||
|
"clock_settime",
|
||||||
},
|
},
|
||||||
Action: types.ActAllow,
|
Action: types.ActAllow,
|
||||||
Args: []*types.Arg{},
|
Args: []*types.Arg{},
|
||||||
|
|
Loading…
Reference in a new issue