return seccomp_restrict_namespaces(c->restrict_namespaces);
}
-#if HAVE_LIBBPF
-static bool skip_lsm_bpf_unsupported(const Unit* u, const char* msg) {
- if (lsm_bpf_supported())
- return false;
-
- log_unit_debug(u, "LSM BPF not supported, skipping %s", msg);
- return true;
-}
-
-static int apply_restrict_filesystems(Unit *u, const ExecContext *c) {
- assert(u);
- assert(c);
-
- if (!exec_context_restrict_filesystems_set(c))
- return 0;
-
- if (skip_lsm_bpf_unsupported(u, "RestrictFileSystems="))
- return 0;
-
- return lsm_bpf_unit_restrict_filesystems(u, c->restrict_filesystems, c->restrict_filesystems_allow_list);
-}
-#endif
-
static int apply_lock_personality(const Unit* u, const ExecContext *c) {
unsigned long personality;
int r;
#endif
+#if HAVE_LIBBPF
+static bool skip_lsm_bpf_unsupported(const Unit* u, const char* msg) {
+ if (lsm_bpf_supported())
+ return false;
+
+ log_unit_debug(u, "LSM BPF not supported, skipping %s", msg);
+ return true;
+}
+
+static int apply_restrict_filesystems(Unit *u, const ExecContext *c) {
+ assert(u);
+ assert(c);
+
+ if (!exec_context_restrict_filesystems_set(c))
+ return 0;
+
+ if (skip_lsm_bpf_unsupported(u, "RestrictFileSystems="))
+ return 0;
+
+ return lsm_bpf_unit_restrict_filesystems(u, c->restrict_filesystems, c->restrict_filesystems_allow_list);
+}
+#endif
+
static int apply_protect_hostname(const Unit *u, const ExecContext *c, int *ret_exit_status) {
assert(u);
assert(c);
/* SPDX-License-Identifier: LGPL-2.1-or-later */
#pragma once
+#if HAVE_SECCOMP
+
#include <seccomp.h>
#include <stdbool.h>
#include <stdint.h>
int parse_syscall_and_errno(const char *in, char **name, int *error);
int seccomp_suppress_sync(void);
+
+#else
+
+static inline bool is_seccomp_available(void) {
+ return false;
+}
+
+#endif