Skip to content

Commit e0f6871

Browse files
Remove flags from seccomp
It's not needed to expose those flags to the user. Signed-off-by: Mauricio Vásquez <[email protected]>
1 parent 2755fc5 commit e0f6871

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

config-linux.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -624,15 +624,13 @@ The following parameters can be specified to set up seccomp:
624624
* `SECCOMP_FILTER_FLAG_TSYNC`
625625
* `SECCOMP_FILTER_FLAG_LOG`
626626
* `SECCOMP_FILTER_FLAG_SPEC_ALLOW`
627-
* `SECCOMP_FILTER_FLAG_NEW_LISTENER`
628-
* `SECCOMP_FILTER_FLAG_TSYNC_ESRCH`
629627

630-
* **`listenerPath`** *(string, OPTIONAL)* - specifies the path of UNIX domain socket over which the runtime will send the [container process state](#containerprocessstate) data structure when the `SECCOMP_FILTER_FLAG_NEW_LISTENER` flag is specified.
628+
* **`listenerPath`** *(string, OPTIONAL)* - specifies the path of UNIX domain socket over which the runtime will send the [container process state](#containerprocessstate) data structure when the `SCMP_ACT_NOTIFY` action is used.
631629
This socket MUST use `AF_UNIX` domain and `SOCK_STREAM` type.
632630
The runtime MUST send exactly one [container process state](#containerprocessstate) per connection.
633631
The connection MUST NOT be reused and it MUST be closed after sending a seccomp state.
634632
If sending to this socket fails, the runtime MUST [generate an error](runtime.md#errors).
635-
This field MUST be set if and only if the flag `SECCOMP_FILTER_FLAG_NEW_LISTENER` is used.
633+
If the `SCMP_ACT_NOTIFY` action is not used this value is ignored.
636634

637635
The runtime sends the following file descriptors using `SCM_RIGHTS` and set their corresponding indexes in the `fdIndexes` map of the [container process state](#containerprocessstate):
638636

0 commit comments

Comments
 (0)