Skip to content

Commit e78a3c3

Browse files
saschagrunertalban
andcommitted
Add available LinuxSeccompFlags
We now list the available `LinuxSeccompFlag` values as part of the runtime spec. Signed-off-by: Sascha Grunert <[email protected]> Co-authored-by: Alban Crequy <[email protected]> Signed-off-by: Sascha Grunert <[email protected]>
1 parent 8958f93 commit e78a3c3

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

specs-go/config.go

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -615,6 +615,19 @@ type Arch string
615615
// LinuxSeccompFlag is a flag to pass to seccomp(2).
616616
type LinuxSeccompFlag string
617617

618+
const (
619+
// LinuxSeccompFlagLog is a seccomp flag to request all returned
620+
// actions except SECCOMP_RET_ALLOW to be logged. An administrator may
621+
// override this filter flag by preventing specific actions from being
622+
// logged via the /proc/sys/kernel/seccomp/actions_logged file. (since
623+
// Linux 4.14)
624+
LinuxSeccompFlagLog LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_LOG"
625+
626+
// LinuxSeccompFlagSpecAllow can be used to disable Speculative Store
627+
// Bypass mitigation. (since Linux 4.17)
628+
LinuxSeccompFlagSpecAllow LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_SPEC_ALLOW"
629+
)
630+
618631
// Additional architectures permitted to be used for system calls
619632
// By default only the native architecture of the kernel is permitted
620633
const (

0 commit comments

Comments
 (0)