pub enum LinuxSeccompFilterFlag {
SeccompFilterFlagLog,
SeccompFilterFlagTsync,
SeccompFilterFlagSpecAllow,
}
Expand description
Available seccomp filter flags.
Variants§
SeccompFilterFlagLog
All filter return actions except SECCOMP_RET_ALLOW should be logged. An administrator may override this filter flag by preventing specific actions from being logged via the /proc/sys/kernel/seccomp/actions_logged file. (since Linux 4.14)
SeccompFilterFlagTsync
When adding a new filter, synchronize all other threads of the calling process to the same seccomp filter tree. A “filter tree” is the ordered list of filters attached to a thread. (Attaching identical filters in separate seccomp() calls results in different filters from this perspective.)
If any thread cannot synchronize to the same filter tree, the call will not attach the new seccomp filter, and will fail, returning the first thread ID found that cannot synchronize. Synchronization will fail if another thread in the same process is in SECCOMP_MODE_STRICT or if it has attached new seccomp filters to itself, diverging from the calling thread’s filter tree.
SeccompFilterFlagSpecAllow
Disable Speculative Store Bypass mitigation. (since Linux 4.17)
Trait Implementations§
Source§impl Clone for LinuxSeccompFilterFlag
impl Clone for LinuxSeccompFilterFlag
Source§fn clone(&self) -> LinuxSeccompFilterFlag
fn clone(&self) -> LinuxSeccompFilterFlag
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more