seccomp_unotify.2: Minor tweaks (part 2) to Rodrigo's patch

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2021-08-08 03:12:43 +02:00
parent 1cca69d3a7
commit 54ae7ac441
1 changed files with 11 additions and 8 deletions

View File

@ -741,16 +741,19 @@ use the file descriptor number specified in the
field.
.TP
.BR SECCOMP_ADDFD_FLAG_SEND " (since Linux 5.14)"
Combines the
.\" commit 0ae71c7720e3ae3aabd2e8a072d27f7bd173d25c
Perform the equivalent of
.B SECCOMP_IOCTL_NOTIF_ADDFD
ioctl with
plus
.B SECCOMP_IOCTL_NOTIF_SEND
into an atomic operation.
On successful invocation, the target process's errno will be 0
as an atomic operation.
On successful invocation, the target process's
.I errno
will be 0
and the return value will be the file descriptor number
that was installed in the target.
If allocating the file descriptor in the tatget fails,
the target's syscall continues to be blocked
that was allocated in the target.
If allocating the file descriptor in the target fails,
the target's system call continues to be blocked
until a successful response is sent.
.RE
.TP
@ -1173,7 +1176,7 @@ flag.
.PP
Furthermore, if the supervisor response is a file descriptor
added with
.B SECCOMP_IOCTL_NOTIF_ADDFD,
.BR SECCOMP_IOCTL_NOTIF_ADDFD ,
then the flag
.B SECCOMP_ADDFD_FLAG_SEND
can be used to atomically add the file descriptor and return that value,