Home | History | Annotate | Download | only in security_SandboxedServices
      1 exe,euser,egroup,pidns,caps,nonewprivs,filter
      2 cloud-init,root,root,No,No,No,No
      3 device_policy_m,root,root,No,No,No,No
      4 first-boot,root,root,No,No,No,No
      5 onboot,root,root,No,No,No,No
      6 systemd-journal,root,root,No,No,No,No
      7 systemd-logind,root,root,No,No,No,No
      8 systemd,root,root,No,No,No,No
      9 systemd-udevd,root,root,No,No,No,No
     10 
     11 # TODO: These processes do not really need to run as root. Figure out a way to
     12 # run them unprivileged/sandboxed.
     13 curl,root,root,No,No,No,No
     14 wait_for_user_d,root,root,No,No,No,No
     15 get_metadata_va,root,root,No,No,No,No
     16 install_custom_,root,root,No,No,No,No
     17 konlet-startup,root,root,No,No,No,No
     18 
     19 # Docker daemon processes.
     20 dockerd,root,root,No,No,No,No
     21 docker-containe,root,root,No,No,No,No
     22 
     23 # Processes that used by GCP compute image packages.
     24 google_ip_forwa,root,root,No,No,No,No
     25 google_accounts,root,root,No,No,No,No
     26 google_clock_sk,root,root,No,No,No,No
     27 google_metadata,root,root,No,No,No,No
     28 google_instance,root,root,No,No,No,No
     29 google_network_,root,root,No,No,No,No
     30