summaryrefslogtreecommitdiffhomepage
path: root/pkg/seccomp
diff options
context:
space:
mode:
authorgVisor bot <gvisor-bot@google.com>2019-09-25 06:51:27 +0000
committergVisor bot <gvisor-bot@google.com>2019-09-25 06:51:27 +0000
commit1872bd8d377ea9874de440356662a70fd95e56fc (patch)
treed23301c164b12899878d85749401590b6df8dd13 /pkg/seccomp
parentaed44ce8fd2d6e28f8c0dc1b34094e51dc846fec (diff)
parent76ff1947b6e3703c2b9524e1086c791ceb4edb74 (diff)
Merge release-20190806.1-180-g76ff194 (automated)
Diffstat (limited to 'pkg/seccomp')
-rw-r--r--pkg/seccomp/seccomp_unsafe.go2
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/seccomp/seccomp_unsafe.go b/pkg/seccomp/seccomp_unsafe.go
index 0a3d92854..be328db12 100644
--- a/pkg/seccomp/seccomp_unsafe.go
+++ b/pkg/seccomp/seccomp_unsafe.go
@@ -35,7 +35,7 @@ type sockFprog struct {
//go:nosplit
func SetFilter(instrs []linux.BPFInstruction) syscall.Errno {
// PR_SET_NO_NEW_PRIVS is required in order to enable seccomp. See seccomp(2) for details.
- if _, _, errno := syscall.RawSyscall(syscall.SYS_PRCTL, linux.PR_SET_NO_NEW_PRIVS, 1, 0); errno != 0 {
+ if _, _, errno := syscall.RawSyscall6(syscall.SYS_PRCTL, linux.PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0, 0); errno != 0 {
return errno
}