You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
error adding seccomp rule for syscall personality: requested action matches default action of filter
config.json could be programatically generated with this kind of redundant rules. Could runc accepts them instead and in this case drop the no-op rule about the personality syscall?
action (string, REQUIRED) - the action for seccomp rules
But it does not say the action has to be different to the default action.
If you think runc's behaviour is correct, I could file an issue on the spec instead to say that the action has to be different than the default action.
I am testing a config.json with seccomp rules that defaults to "allow" and a syscall with the same action "allow".
runc returns the error
config.json
could be programatically generated with this kind of redundant rules. Could runc accepts them instead and in this case drop the no-op rule about thepersonality
syscall?In the spec about actions, it says:
But it does not say the action has to be different to the default action.
If you think runc's behaviour is correct, I could file an issue on the spec instead to say that the action has to be different than the default action.
This issue was found with runtime-tools test linux_seccomp.go.
The text was updated successfully, but these errors were encountered: