Skip to content

Commit

Permalink
Add support for seccomp filter flags
Browse files Browse the repository at this point in the history
crun supports seccomp filter flags since containers/crun@fefabff
runc will get them with opencontainers/runc#3390
youki will get them with containers/youki#733

To support them generally, we now copy the flags during the seccomp
setup, otherwise they will get lost.

Signed-off-by: Sascha Grunert <[email protected]>
  • Loading branch information
saschagrunert committed Feb 23, 2022
1 parent 194ee74 commit ca5e983
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 0 deletions.
5 changes: 5 additions & 0 deletions pkg/seccomp/seccomp_linux.go
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
//go:build seccomp
// +build seccomp

// SPDX-License-Identifier: Apache-2.0
Expand Down Expand Up @@ -120,6 +121,10 @@ func setupSeccomp(config *Seccomp, rs *specs.Spec) (*specs.LinuxSeccomp, error)
return nil, err
}

for _, flag := range config.Flags {
newConfig.Flags = append(newConfig.Flags, specs.LinuxSeccompFlag(flag))
}

if len(config.ArchMap) != 0 {
for _, a := range config.ArchMap {
seccompArch, ok := nativeToSeccomp[arch]
Expand Down
1 change: 1 addition & 0 deletions pkg/seccomp/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ type Seccomp struct {
Architectures []Arch `json:"architectures,omitempty"`
ArchMap []Architecture `json:"archMap,omitempty"`
Syscalls []*Syscall `json:"syscalls"`
Flags []string `json:"flags,omitempty"`
}

// Architecture is used to represent a specific architecture
Expand Down

0 comments on commit ca5e983

Please sign in to comment.