* [PATCH v2] proc.5: add Seccomp_filters entry
@ 2023-08-14 8:33 Sascha Grunert
2023-08-14 10:36 ` Alejandro Colomar
0 siblings, 1 reply; 2+ messages in thread
From: Sascha Grunert @ 2023-08-14 8:33 UTC (permalink / raw)
To: Alejandro Colomar; +Cc: linux-man, Kees Cook, Sascha Grunert, Sascha Grunert
From: Sascha Grunert <sgrunert@redhat.com>
The field exists since Linux 5.9 (818c03) but have not been documented
yet.
Signed-off-by: Sascha Grunert <saschagrunert@gmail.com>
---
man5/proc.5 | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/man5/proc.5 b/man5/proc.5
index 04b45ccb7..c80b93e24 100644
--- a/man5/proc.5
+++ b/man5/proc.5
@@ -2551,6 +2551,7 @@ CapBnd: ffffffffffffffff
CapAmb: 0000000000000000
NoNewPrivs: 0
Seccomp: 0
+Seccomp_filters: 0
Speculation_Store_Bypass: vulnerable
Cpus_allowed: 00000001
Cpus_allowed_list: 0
@@ -2809,6 +2810,12 @@ This field is provided only if the kernel was built with the
.B CONFIG_SECCOMP
kernel configuration option enabled.
.TP
+.I Seccomp_filters
+.\" commit c818c03b661cd769e035e41673d5543ba2ebda64
+Number of seccomp filters attached to the process
+(since Linux 5.9, see
+.BR seccomp (2)).
+.TP
.I Speculation_Store_Bypass
.\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
Speculation flaw mitigation state
--
2.41.0
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH v2] proc.5: add Seccomp_filters entry
2023-08-14 8:33 [PATCH v2] proc.5: add Seccomp_filters entry Sascha Grunert
@ 2023-08-14 10:36 ` Alejandro Colomar
0 siblings, 0 replies; 2+ messages in thread
From: Alejandro Colomar @ 2023-08-14 10:36 UTC (permalink / raw)
To: Sascha Grunert; +Cc: linux-man, Kees Cook, Sascha Grunert, Stefan Puiu
[-- Attachment #1.1: Type: text/plain, Size: 1324 bytes --]
Hi Sascha,
On 2023-08-14 10:33, Sascha Grunert wrote:
> From: Sascha Grunert <sgrunert@redhat.com>
>
> The field exists since Linux 5.9 (818c03) but have not been documented
> yet.
>
> Signed-off-by: Sascha Grunert <saschagrunert@gmail.com>
Patch applied. Thanks,
Alex
> ---
> man5/proc.5 | 7 +++++++
> 1 file changed, 7 insertions(+)
>
> diff --git a/man5/proc.5 b/man5/proc.5
> index 04b45ccb7..c80b93e24 100644
> --- a/man5/proc.5
> +++ b/man5/proc.5
> @@ -2551,6 +2551,7 @@ CapBnd: ffffffffffffffff
> CapAmb: 0000000000000000
> NoNewPrivs: 0
> Seccomp: 0
> +Seccomp_filters: 0
> Speculation_Store_Bypass: vulnerable
> Cpus_allowed: 00000001
> Cpus_allowed_list: 0
> @@ -2809,6 +2810,12 @@ This field is provided only if the kernel was built with the
> .B CONFIG_SECCOMP
> kernel configuration option enabled.
> .TP
> +.I Seccomp_filters
> +.\" commit c818c03b661cd769e035e41673d5543ba2ebda64
> +Number of seccomp filters attached to the process
> +(since Linux 5.9, see
> +.BR seccomp (2)).
> +.TP
> .I Speculation_Store_Bypass
> .\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
> Speculation flaw mitigation state
--
<http://www.alejandro-colomar.es/>
GPG key fingerprint: A9348594CE31283A826FBDD8D57633D441E25BB5
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-08-14 10:37 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-08-14 8:33 [PATCH v2] proc.5: add Seccomp_filters entry Sascha Grunert
2023-08-14 10:36 ` Alejandro Colomar
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox