diff options
author | gVisor bot <gvisor-bot@google.com> | 2019-09-25 06:51:27 +0000 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2019-09-25 06:51:27 +0000 |
commit | 1872bd8d377ea9874de440356662a70fd95e56fc (patch) | |
tree | d23301c164b12899878d85749401590b6df8dd13 /pkg/seccomp | |
parent | aed44ce8fd2d6e28f8c0dc1b34094e51dc846fec (diff) | |
parent | 76ff1947b6e3703c2b9524e1086c791ceb4edb74 (diff) |
Merge release-20190806.1-180-g76ff194 (automated)
Diffstat (limited to 'pkg/seccomp')
-rw-r--r-- | pkg/seccomp/seccomp_unsafe.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/seccomp/seccomp_unsafe.go b/pkg/seccomp/seccomp_unsafe.go index 0a3d92854..be328db12 100644 --- a/pkg/seccomp/seccomp_unsafe.go +++ b/pkg/seccomp/seccomp_unsafe.go @@ -35,7 +35,7 @@ type sockFprog struct { //go:nosplit func SetFilter(instrs []linux.BPFInstruction) syscall.Errno { // PR_SET_NO_NEW_PRIVS is required in order to enable seccomp. See seccomp(2) for details. - if _, _, errno := syscall.RawSyscall(syscall.SYS_PRCTL, linux.PR_SET_NO_NEW_PRIVS, 1, 0); errno != 0 { + if _, _, errno := syscall.RawSyscall6(syscall.SYS_PRCTL, linux.PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0, 0); errno != 0 { return errno } |