diff options
author | Mike Frysinger <vapier@gentoo.org> | 2015-08-18 03:25:27 -0400 |
---|---|---|
committer | Paul Moore <pmoore@redhat.com> | 2015-08-28 19:20:16 -0400 |
commit | 28e50c6b84aed18cbb886b26879c47f1b2e3ea24 (patch) | |
tree | 4c9fada7e3de7eeec6fae2aaf67ce9457a7f221d | |
parent | a8fe571909e381b34d0ae0237aad71513f8739de (diff) | |
download | libseccomp-28e50c6b84aed18cbb886b26879c47f1b2e3ea24.tar.gz |
docs: improve kill/trap documentation text in seccomp_init(3)
The current description is fairly light as to the runtime behavior when
the filters fail. Expand more to make it clear what happens between the
two modes.
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
[PM: tweaked subject line, changed 'BRm' macro to 'BR']
Signed-off-by: Paul Moore <pmoore@redhat.com>
-rw-r--r-- | doc/man/man3/seccomp_init.3 | 17 |
1 files changed, 11 insertions, 6 deletions
diff --git a/doc/man/man3/seccomp_init.3 b/doc/man/man3/seccomp_init.3 index 32f17c5..65f9a7f 100644 --- a/doc/man/man3/seccomp_init.3 +++ b/doc/man/man3/seccomp_init.3 @@ -48,12 +48,17 @@ Valid values are as follows: .TP .B SCMP_ACT_KILL -The thread will be killed by the kernel when it calls a syscall that does not -match any of the configured seccomp filter rules. +The thread will be terminated by the kernel with SIGSYS when it calls a syscall +that does not match any of the configured seccomp filter rules. The thread +will not be able to catch the signal. .TP .B SCMP_ACT_TRAP -The thread will throw a SIGSYS signal when it calls a syscall that does not -match any of the configured seccomp filter rules. +The thread will be sent a SIGSYS signal when it calls a syscall that does not +match any of the configured seccomp filter rules. It may catch this and change +its behavior accordingly. When using SA_SIGINFO with +.BR sigaction (2), +si_code will be set to SYS_SECCOMP, si_syscall will be set to the syscall that +failed the rules, and si_arch will be set to the AUDIT_ARCH for the active ABI. .TP .B SCMP_ACT_ERRNO(uint16_t errno) The thread will receive a return value of @@ -67,8 +72,8 @@ If the thread is being traced and the tracing process specified the option in the call to .BR ptrace (2), the tracing process will be notified, via -.B PTRACE_EVENT_SECCOMP -, and the value provided in +.BR PTRACE_EVENT_SECCOMP , +and the value provided in .I msg_num can be retrieved using the .B PTRACE_GETEVENTMSG |