diff options
author | Fred Barclay <Fred-Barclay@users.noreply.github.com> | 2017-05-24 14:13:52 -0500 |
---|---|---|
committer | Fred Barclay <Fred-Barclay@users.noreply.github.com> | 2017-05-24 14:13:52 -0500 |
commit | 96c920e166b40bbe50f216e294f2efac154a1cb2 (patch) | |
tree | fa80a34e81863ab897f2f2b8ec4124b10d023516 /src/fseccomp/seccomp_secondary.c | |
parent | remove trailing whitespace from etc/ (diff) | |
download | firejail-96c920e166b40bbe50f216e294f2efac154a1cb2.tar.gz firejail-96c920e166b40bbe50f216e294f2efac154a1cb2.tar.zst firejail-96c920e166b40bbe50f216e294f2efac154a1cb2.zip |
Remove trailing whitespace from src/
Diffstat (limited to 'src/fseccomp/seccomp_secondary.c')
-rw-r--r-- | src/fseccomp/seccomp_secondary.c | 13 |
1 files changed, 6 insertions, 7 deletions
diff --git a/src/fseccomp/seccomp_secondary.c b/src/fseccomp/seccomp_secondary.c index 79c85eb75..8270b7018 100644 --- a/src/fseccomp/seccomp_secondary.c +++ b/src/fseccomp/seccomp_secondary.c | |||
@@ -28,7 +28,7 @@ void seccomp_secondary_64(const char *fname) { | |||
28 | EXAMINE_SYSCALL, | 28 | EXAMINE_SYSCALL, |
29 | BLACKLIST(165), // mount | 29 | BLACKLIST(165), // mount |
30 | BLACKLIST(166), // umount2 | 30 | BLACKLIST(166), // umount2 |
31 | // todo: implement --allow-debuggers | 31 | // todo: implement --allow-debuggers |
32 | BLACKLIST(101), // ptrace | 32 | BLACKLIST(101), // ptrace |
33 | BLACKLIST(246), // kexec_load | 33 | BLACKLIST(246), // kexec_load |
34 | BLACKLIST(304), // open_by_handle_at | 34 | BLACKLIST(304), // open_by_handle_at |
@@ -77,7 +77,7 @@ void seccomp_secondary_64(const char *fname) { | |||
77 | BLACKLIST(169), // reboot | 77 | BLACKLIST(169), // reboot |
78 | BLACKLIST(180), // nfsservctl | 78 | BLACKLIST(180), // nfsservctl |
79 | BLACKLIST(177), // get_kernel_syms | 79 | BLACKLIST(177), // get_kernel_syms |
80 | 80 | ||
81 | RETURN_ALLOW | 81 | RETURN_ALLOW |
82 | }; | 82 | }; |
83 | 83 | ||
@@ -87,7 +87,7 @@ void seccomp_secondary_64(const char *fname) { | |||
87 | fprintf(stderr, "Error fseccomp: cannot open %s file\n", fname); | 87 | fprintf(stderr, "Error fseccomp: cannot open %s file\n", fname); |
88 | exit(1); | 88 | exit(1); |
89 | } | 89 | } |
90 | 90 | ||
91 | int size = (int) sizeof(filter); | 91 | int size = (int) sizeof(filter); |
92 | int written = 0; | 92 | int written = 0; |
93 | while (written < size) { | 93 | while (written < size) { |
@@ -109,7 +109,7 @@ void seccomp_secondary_32(const char *fname) { | |||
109 | EXAMINE_SYSCALL, | 109 | EXAMINE_SYSCALL, |
110 | BLACKLIST(21), // mount | 110 | BLACKLIST(21), // mount |
111 | BLACKLIST(52), // umount2 | 111 | BLACKLIST(52), // umount2 |
112 | // todo: implement --allow-debuggers | 112 | // todo: implement --allow-debuggers |
113 | BLACKLIST(26), // ptrace | 113 | BLACKLIST(26), // ptrace |
114 | BLACKLIST(283), // kexec_load | 114 | BLACKLIST(283), // kexec_load |
115 | BLACKLIST(341), // name_to_handle_at | 115 | BLACKLIST(341), // name_to_handle_at |
@@ -157,7 +157,7 @@ void seccomp_secondary_32(const char *fname) { | |||
157 | BLACKLIST(88), // reboot | 157 | BLACKLIST(88), // reboot |
158 | BLACKLIST(169), // nfsservctl | 158 | BLACKLIST(169), // nfsservctl |
159 | BLACKLIST(130), // get_kernel_syms | 159 | BLACKLIST(130), // get_kernel_syms |
160 | 160 | ||
161 | RETURN_ALLOW | 161 | RETURN_ALLOW |
162 | }; | 162 | }; |
163 | 163 | ||
@@ -167,7 +167,7 @@ void seccomp_secondary_32(const char *fname) { | |||
167 | fprintf(stderr, "Error fseccomp: cannot open %s file\n", fname); | 167 | fprintf(stderr, "Error fseccomp: cannot open %s file\n", fname); |
168 | exit(1); | 168 | exit(1); |
169 | } | 169 | } |
170 | 170 | ||
171 | int size = (int) sizeof(filter); | 171 | int size = (int) sizeof(filter); |
172 | int written = 0; | 172 | int written = 0; |
173 | while (written < size) { | 173 | while (written < size) { |
@@ -180,4 +180,3 @@ void seccomp_secondary_32(const char *fname) { | |||
180 | } | 180 | } |
181 | close(dst); | 181 | close(dst); |
182 | } | 182 | } |
183 | |||