On 14/03/2017 12:32, Eduardo Otubo wrote:
> +static const struct QemuSeccompSyscall obsolete[] = {
> + { SCMP_SYS(readdir), 255 },
> + { SCMP_SYS(_sysctl), 255 },
> + { SCMP_SYS(afs_syscall), 255 },
> + { SCMP_SYS(bdflush), 255 },
> + { SCMP_SYS(break), 255 },
> + { SCMP_SYS(create_module), 255 },
> + { SCMP_SYS(ftime), 255 },
> + { SCMP_SYS(get_kernel_syms), 255 },
> + { SCMP_SYS(getpmsg), 255 },
> + { SCMP_SYS(gtty), 255 },
> + { SCMP_SYS(lock), 255 },
> + { SCMP_SYS(mpx), 255 },
> + { SCMP_SYS(prof), 255 },
> + { SCMP_SYS(profil), 255 },
> + { SCMP_SYS(putpmsg), 255 },
> + { SCMP_SYS(query_module), 255 },
> + { SCMP_SYS(security), 255 },
> + { SCMP_SYS(sgetmask), 255 },
> + { SCMP_SYS(ssetmask), 255 },
> + { SCMP_SYS(stty), 255 },
> + { SCMP_SYS(sysfs), 255 },
> + { SCMP_SYS(tuxcall), 255 },
> + { SCMP_SYS(ulimit), 255 },
> + { SCMP_SYS(uselib), 255 },
> + { SCMP_SYS(ustat), 255 },
> + { SCMP_SYS(vserver), 255 },
> +};
Some of these are already blacklisted in patch 1.
Paolo