You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The `sendSeccompFd` hooks is only called if the seccomp policy contains `SCMP_ACT_NOTIFY`.
487
+
488
+
The `sendSeccompFd` hooks MUST be called after the [`start`](runtime.md#start) operation is called and after the seccomp policy is installed but [before the user-specified program command is executed](runtime.md#lifecycle).
489
+
The goal of this hook is to pass the seccomp file descriptor to a seccomp agent.
490
+
491
+
The `sendSeccompFd` hooks' path MUST resolve in the [runtime namespace](glossary.md#runtime-namespace).
492
+
The `peccompFdoststop` hooks MUST be executed in the [runtime namespace](glossary.md#runtime-namespace).
493
+
479
494
### Summary
480
495
481
496
See the below table for a summary of hooks and when they are called:
@@ -488,6 +503,7 @@ See the below table for a summary of hooks and when they are called:
488
503
|`startContainer`| container | After the start operation is called but before the user-specified program command is executed. |
489
504
|`poststart`| runtime | After the user-specified process is executed but before the start operation returns. |
490
505
|`poststop`| runtime | After the container is deleted but before the delete operation returns. |
506
+
|`sendSeccompFd`| runtime | After the start operation is called but before the user-specified program command is executed. |
491
507
492
508
### Example
493
509
@@ -536,6 +552,13 @@ See the below table for a summary of hooks and when they are called:
0 commit comments