Skip to content

Commit cbb84be

Browse files
authored
Merge pull request #1161 from kinvolk/alban_seccomp_flags
seccomp: Add flag SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV
2 parents 901acb9 + 4bcd065 commit cbb84be

File tree

3 files changed

+7
-1
lines changed

3 files changed

+7
-1
lines changed

config-linux.md

+1
Original file line numberDiff line numberDiff line change
@@ -701,6 +701,7 @@ The following parameters can be specified to set up seccomp:
701701
* `SECCOMP_FILTER_FLAG_TSYNC`
702702
* `SECCOMP_FILTER_FLAG_LOG`
703703
* `SECCOMP_FILTER_FLAG_SPEC_ALLOW`
704+
* `SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV`
704705

705706
* **`listenerPath`** *(string, OPTIONAL)* - specifies the path of UNIX domain socket over which the runtime will send the [container process state](#containerprocessstate) data structure when the `SCMP_ACT_NOTIFY` action is used.
706707
This socket MUST use `AF_UNIX` domain and `SOCK_STREAM` type.

schema/defs-linux.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,8 @@
7070
"enum": [
7171
"SECCOMP_FILTER_FLAG_TSYNC",
7272
"SECCOMP_FILTER_FLAG_LOG",
73-
"SECCOMP_FILTER_FLAG_SPEC_ALLOW"
73+
"SECCOMP_FILTER_FLAG_SPEC_ALLOW",
74+
"SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV"
7475
]
7576
},
7677
"SeccompOperators": {

specs-go/config.go

+4
Original file line numberDiff line numberDiff line change
@@ -645,6 +645,10 @@ const (
645645
// LinuxSeccompFlagSpecAllow can be used to disable Speculative Store
646646
// Bypass mitigation. (since Linux 4.17)
647647
LinuxSeccompFlagSpecAllow LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_SPEC_ALLOW"
648+
649+
// LinuxSeccompFlagWaitKillableRecv can be used to switch to the wait
650+
// killable semantics. (since Linux 5.19)
651+
LinuxSeccompFlagWaitKillableRecv LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV"
648652
)
649653

650654
// Additional architectures permitted to be used for system calls

0 commit comments

Comments
 (0)