@@ -51,17 +51,18 @@ const struct sock_filter FILTER[] = {
51
51
// Load the system call number into accumulator
52
52
BPF_STMT (BPF_LD | BPF_W | BPF_ABS, SECCOMP_DATA_NR_OFFSET),
53
53
// Only applies to X86_64 arch. Jump to disallow for calls using the x32 ABI
54
- BPF_JUMP (BPF_JMP | BPF_JGT | BPF_K, UPPER_NR_LIMIT, 35 , 0 ),
54
+ BPF_JUMP (BPF_JMP | BPF_JGT | BPF_K, UPPER_NR_LIMIT, 36 , 0 ),
55
55
// If any sys call filters are added or removed then the jump
56
56
// destination for each statement including the one above must
57
57
// be updated accordingly
58
58
59
59
// Allowed sys calls, jump to return allow on match
60
- BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_read, 35 , 0 ),
61
- BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_write, 34 , 0 ),
62
- BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_writev, 33 , 0 ),
63
- BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_lseek, 32 , 0 ),
64
- BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_lstat, 31 , 0 ),
60
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_read, 36 , 0 ),
61
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_write, 35 , 0 ),
62
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_writev, 34 , 0 ),
63
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_lseek, 33 , 0 ),
64
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_lstat, 32 , 0 ),
65
+ BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_clock_gettime, 31 , 0 ),
65
66
BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_readlink, 30 , 0 ),
66
67
BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_stat, 29 , 0 ),
67
68
BPF_JUMP (BPF_JMP | BPF_JEQ | BPF_K, __NR_fstat, 28 , 0 ),
0 commit comments