Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

seccomp: do not ignore SPEC_ALLOW flag #3580

Merged
merged 2 commits into from
Sep 13, 2022

Commits on Aug 29, 2022

  1. libct/seccomp/patchbpf: support SPEC_ALLOW

    Commit 58ea21d added support for seccomp flags such as
    SPEC_ALLOW, but it does not work as expected, because since commit
    7a8d716 we do not use libseccomp-golang's Load(), but
    handle flags separately in patchbfp.
    
    This fixes setting SPEC_ALLOW flag.
    
    Add a comment to not forget to amend filterFlags when adding new flags.
    
    Signed-off-by: Kir Kolyshkin <[email protected]>
    kolyshkin committed Aug 29, 2022
    Configuration menu
    Copy the full SHA
    c7dc8b1 View commit details
    Browse the repository at this point in the history

Commits on Aug 31, 2022

  1. seccomp: fix flag test to actually check the value

    Add a debug print of seccomp flags value, so the test can check
    those (without using something like strace, that is).
    
    Amend the flags setting test with the numeric values expected, and the
    logic to check those.
    
    Signed-off-by: Kir Kolyshkin <[email protected]>
    kolyshkin committed Aug 31, 2022
    Configuration menu
    Copy the full SHA
    26dc55e View commit details
    Browse the repository at this point in the history