Skip to content

Commit e78a3c3

Browse files
saschagrunertalban
andcommitted
Add available LinuxSeccompFlags
We now list the available `LinuxSeccompFlag` values as part of the runtime spec. Signed-off-by: Sascha Grunert <sgrunert@redhat.com> Co-authored-by: Alban Crequy <muadda@gmail.com> Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
1 parent 8958f93 commit e78a3c3

1 file changed

Lines changed: 13 additions & 0 deletions

File tree

specs-go/config.go

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -615,6 +615,19 @@ type Arch string
615615
// LinuxSeccompFlag is a flag to pass to seccomp(2).
616616
type LinuxSeccompFlag string
617617

618+
const (
619+
// LinuxSeccompFlagLog is a seccomp flag to request all returned
620+
// actions except SECCOMP_RET_ALLOW to be logged. An administrator may
621+
// override this filter flag by preventing specific actions from being
622+
// logged via the /proc/sys/kernel/seccomp/actions_logged file. (since
623+
// Linux 4.14)
624+
LinuxSeccompFlagLog LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_LOG"
625+
626+
// LinuxSeccompFlagSpecAllow can be used to disable Speculative Store
627+
// Bypass mitigation. (since Linux 4.17)
628+
LinuxSeccompFlagSpecAllow LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_SPEC_ALLOW"
629+
)
630+
618631
// Additional architectures permitted to be used for system calls
619632
// By default only the native architecture of the kernel is permitted
620633
const (

0 commit comments

Comments
 (0)