File tree Expand file tree Collapse file tree 3 files changed +18
-0
lines changed Expand file tree Collapse file tree 3 files changed +18
-0
lines changed Original file line number Diff line number Diff line change @@ -47,6 +47,8 @@ func DefaultProfile() *Seccomp {
4747 enosys := uint (unix .ENOSYS )
4848 eperm := uint (unix .EPERM )
4949
50+ flags := []string {SeccompFilterFlagSpecALlow }
51+
5052 syscalls := []* Syscall {
5153 {
5254 Names : []string {
@@ -882,5 +884,6 @@ func DefaultProfile() *Seccomp {
882884 DefaultErrnoRet : & enosys ,
883885 ArchMap : arches (),
884886 Syscalls : syscalls ,
887+ Flags : flags ,
885888 }
886889}
Original file line number Diff line number Diff line change 10371037 },
10381038 "excludes" : {}
10391039 }
1040+ ],
1041+ "flags" : [
1042+ " SECCOMP_FILTER_FLAG_SPEC_ALLOW"
10401043 ]
10411044}
Original file line number Diff line number Diff line change @@ -20,6 +20,18 @@ type Seccomp struct {
2020 Flags []string `json:"flags,omitempty"`
2121}
2222
23+ const (
24+ // SeccompFilterFlagLog is the filter to return actions except
25+ // SECCOMP_RET_ALLOW should be logged. An administrator may override this
26+ // filter flag by preventing specific actions from being logged via the
27+ // /proc/sys/kernel/seccomp/actions_logged file. (since Linux 4.14)
28+ SeccompFilterFlagLog = "SECCOMP_FILTER_FLAG_LOG"
29+
30+ // SeccompFilterFlagSpecALlow can be used to disable Speculative Store
31+ // Bypass mitigation. (since Linux 4.17)
32+ SeccompFilterFlagSpecALlow = "SECCOMP_FILTER_FLAG_SPEC_ALLOW"
33+ )
34+
2335// Architecture is used to represent a specific architecture
2436// and its sub-architectures
2537type Architecture struct {
You can’t perform that action at this time.
0 commit comments