Skip to content
Discussion options

You must be logged in to vote

It might be more helpful to use strace -f -e seccomp to get the arguments as well, but my guess is that this is for kernel feature detection.

Note we do not call seccomp(2) directly in runc, instead we use the official Go bindings for libseccomp so you'll need to look at libseccomp to see what they're doing.

EDIT: Sorry, we do call seccomp(2) at the end to load the filter because we have code to patch the filter generated by libseccomp. See #2750.

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
0 replies
Answer selected by cyphar
Comment options

You must be logged in to vote
2 replies
@cyphar
Comment options

@ilp-sys
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants