summaryrefslogtreecommitdiff
path: root/src/shared/seccomp-util.c
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2023-03-24 11:15:21 +0100
committerLennart Poettering <lennart@poettering.net>2023-03-24 12:27:23 +0100
commitd12632a86103b5f9ff1ce61977661ad0c1e8a018 (patch)
treec67e6822883d2d676219bf705f879de93a53677a /src/shared/seccomp-util.c
parentaadbd81f7ffbc313d0541c15455211dddeedbfde (diff)
downloadsystemd-d12632a86103b5f9ff1ce61977661ad0c1e8a018.tar.gz
seccomp-util: add new @sandbox syscall group with landlock/seccomp
Let's group these 4 syscalls, as they offer similar things and I guess might be used in conjunction quite often, as they offer unprivileged sandboxing. Fixes: #26913
Diffstat (limited to 'src/shared/seccomp-util.c')
-rw-r--r--src/shared/seccomp-util.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/src/shared/seccomp-util.c b/src/shared/seccomp-util.c
index 8ece7f163f..a855f34602 100644
--- a/src/shared/seccomp-util.c
+++ b/src/shared/seccomp-util.c
@@ -800,6 +800,15 @@ const SyscallFilterSet syscall_filter_sets[_SYSCALL_FILTER_SET_MAX] = {
"setpriority\0"
"setrlimit\0"
},
+ [SYSCALL_FILTER_SET_SANDBOX] = {
+ .name = "@sandbox",
+ .help = "Sandbox functionality",
+ .value =
+ "landlock_add_rule\0"
+ "landlock_create_ruleset\0"
+ "landlock_restrict_self\0"
+ "seccomp\0"
+ },
[SYSCALL_FILTER_SET_SETUID] = {
.name = "@setuid",
.help = "Operations for changing user/group credentials",