mirror of
https://github.com/opencontainers/runtime-spec.git
synced 2026-02-05 09:45:57 +01:00
seccomp: Add flag SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV
Linux 5.19 introduced a new seccomp flag: SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV It is useful for seccomp notify when handling notification from Golang programs which are often preempted by the runtime with SIGURG. Signed-off-by: Alban Crequy <albancrequy@microsoft.com>
This commit is contained in:
@@ -701,6 +701,7 @@ The following parameters can be specified to set up seccomp:
|
||||
* `SECCOMP_FILTER_FLAG_TSYNC`
|
||||
* `SECCOMP_FILTER_FLAG_LOG`
|
||||
* `SECCOMP_FILTER_FLAG_SPEC_ALLOW`
|
||||
* `SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV`
|
||||
|
||||
* **`listenerPath`** *(string, OPTIONAL)* - specifies the path of UNIX domain socket over which the runtime will send the [container process state](#containerprocessstate) data structure when the `SCMP_ACT_NOTIFY` action is used.
|
||||
This socket MUST use `AF_UNIX` domain and `SOCK_STREAM` type.
|
||||
|
||||
@@ -70,7 +70,8 @@
|
||||
"enum": [
|
||||
"SECCOMP_FILTER_FLAG_TSYNC",
|
||||
"SECCOMP_FILTER_FLAG_LOG",
|
||||
"SECCOMP_FILTER_FLAG_SPEC_ALLOW"
|
||||
"SECCOMP_FILTER_FLAG_SPEC_ALLOW",
|
||||
"SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV"
|
||||
]
|
||||
},
|
||||
"SeccompOperators": {
|
||||
|
||||
@@ -645,6 +645,10 @@ const (
|
||||
// LinuxSeccompFlagSpecAllow can be used to disable Speculative Store
|
||||
// Bypass mitigation. (since Linux 4.17)
|
||||
LinuxSeccompFlagSpecAllow LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_SPEC_ALLOW"
|
||||
|
||||
// LinuxSeccompFlagWaitKillableRecv can be used to switch to the wait
|
||||
// killable semantics. (since Linux 5.19)
|
||||
LinuxSeccompFlagWaitKillableRecv LinuxSeccompFlag = "SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV"
|
||||
)
|
||||
|
||||
// Additional architectures permitted to be used for system calls
|
||||
|
||||
Reference in New Issue
Block a user