public inbox for linux-man@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2] proc.5: add Seccomp_filters entry
@ 2023-08-14  8:33 Sascha Grunert
  2023-08-14 10:36 ` Alejandro Colomar
  0 siblings, 1 reply; 2+ messages in thread
From: Sascha Grunert @ 2023-08-14  8:33 UTC (permalink / raw)
  To: Alejandro Colomar; +Cc: linux-man, Kees Cook, Sascha Grunert, Sascha Grunert

From: Sascha Grunert <sgrunert@redhat.com>

The field exists since Linux 5.9 (818c03) but have not been documented
yet.

Signed-off-by: Sascha Grunert <saschagrunert@gmail.com>
---
 man5/proc.5 | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/man5/proc.5 b/man5/proc.5
index 04b45ccb7..c80b93e24 100644
--- a/man5/proc.5
+++ b/man5/proc.5
@@ -2551,6 +2551,7 @@ CapBnd: ffffffffffffffff
 CapAmb:	0000000000000000
 NoNewPrivs:     0
 Seccomp:        0
+Seccomp_filters:        0
 Speculation_Store_Bypass:       vulnerable
 Cpus_allowed:   00000001
 Cpus_allowed_list:      0
@@ -2809,6 +2810,12 @@ This field is provided only if the kernel was built with the
 .B CONFIG_SECCOMP
 kernel configuration option enabled.
 .TP
+.I Seccomp_filters
+.\" commit c818c03b661cd769e035e41673d5543ba2ebda64
+Number of seccomp filters attached to the process
+(since Linux 5.9, see
+.BR seccomp (2)).
+.TP
 .I Speculation_Store_Bypass
 .\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
 Speculation flaw mitigation state
-- 
2.41.0


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH v2] proc.5: add Seccomp_filters entry
  2023-08-14  8:33 [PATCH v2] proc.5: add Seccomp_filters entry Sascha Grunert
@ 2023-08-14 10:36 ` Alejandro Colomar
  0 siblings, 0 replies; 2+ messages in thread
From: Alejandro Colomar @ 2023-08-14 10:36 UTC (permalink / raw)
  To: Sascha Grunert; +Cc: linux-man, Kees Cook, Sascha Grunert, Stefan Puiu


[-- Attachment #1.1: Type: text/plain, Size: 1324 bytes --]

Hi Sascha,

On 2023-08-14 10:33, Sascha Grunert wrote:
> From: Sascha Grunert <sgrunert@redhat.com>
> 
> The field exists since Linux 5.9 (818c03) but have not been documented
> yet.
> 
> Signed-off-by: Sascha Grunert <saschagrunert@gmail.com>

Patch applied.  Thanks,
Alex

> ---
>  man5/proc.5 | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/man5/proc.5 b/man5/proc.5
> index 04b45ccb7..c80b93e24 100644
> --- a/man5/proc.5
> +++ b/man5/proc.5
> @@ -2551,6 +2551,7 @@ CapBnd: ffffffffffffffff
>  CapAmb:	0000000000000000
>  NoNewPrivs:     0
>  Seccomp:        0
> +Seccomp_filters:        0
>  Speculation_Store_Bypass:       vulnerable
>  Cpus_allowed:   00000001
>  Cpus_allowed_list:      0
> @@ -2809,6 +2810,12 @@ This field is provided only if the kernel was built with the
>  .B CONFIG_SECCOMP
>  kernel configuration option enabled.
>  .TP
> +.I Seccomp_filters
> +.\" commit c818c03b661cd769e035e41673d5543ba2ebda64
> +Number of seccomp filters attached to the process
> +(since Linux 5.9, see
> +.BR seccomp (2)).
> +.TP
>  .I Speculation_Store_Bypass
>  .\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
>  Speculation flaw mitigation state

-- 
<http://www.alejandro-colomar.es/>
GPG key fingerprint: A9348594CE31283A826FBDD8D57633D441E25BB5


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-08-14 10:37 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-08-14  8:33 [PATCH v2] proc.5: add Seccomp_filters entry Sascha Grunert
2023-08-14 10:36 ` Alejandro Colomar

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox