mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-10-15 22:38:37 +00:00
This requires that users have `CAP_SYSLOG` in order to access `dmesg`. This means that containers by default have no access to `dmesg` (which can leak information about the host or other containers) unless they have this capability added. Signed-off-by: Justin Cormack <justin.cormack@docker.com>
29 lines
879 B
Plaintext
29 lines
879 B
Plaintext
# from Alpine defaults
|
|
net.ipv4.tcp_syncookies = 1
|
|
net.ipv4.conf.default.rp_filter = 1
|
|
net.ipv4.conf.all.rp_filter = 1
|
|
net.ipv4.ping_group_range=999 59999
|
|
# general limits
|
|
vm.max_map_count = 262144
|
|
vm.overcommit_memory = 1
|
|
net.core.somaxconn = 1024
|
|
net.ipv4.neigh.default.gc_thresh1 = 30000
|
|
net.ipv4.neigh.default.gc_thresh2 = 32000
|
|
net.ipv4.neigh.default.gc_thresh3 = 32768
|
|
fs.aio-max-nr = 1048576
|
|
fs.inotify.max_user_watches = 524288
|
|
fs.file-max = 524288
|
|
# for rngd
|
|
kernel.random.write_wakeup_threshold = 3072
|
|
# security restrictions
|
|
kernel.kptr_restrict = 2
|
|
net.ipv4.conf.all.send_redirects = 0
|
|
net.ipv4.conf.default.accept_redirects = 0
|
|
net.ipv4.conf.default.accept_source_route = 0
|
|
net.ipv6.conf.all.accept_redirects = 0
|
|
net.ipv6.conf.default.accept_redirects = 0
|
|
kernel.dmesg_restrict = 1
|
|
kernel.perf_event_paranoid = 3
|
|
fs.protected_hardlinks = 1
|
|
fs.protected_symlinks = 1
|