|
@@ -480,7 +480,7 @@ sb_chmod(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
|
|
|
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chmod),
|
|
|
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
|
|
|
if (rc != 0) {
|
|
|
- log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
|
|
|
+ log_err(LD_BUG,"(Sandbox) failed to add chmod syscall, received "
|
|
|
"libseccomp error %d", rc);
|
|
|
return rc;
|
|
|
}
|
|
@@ -505,7 +505,7 @@ sb_chown(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
|
|
|
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chown),
|
|
|
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
|
|
|
if (rc != 0) {
|
|
|
- log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
|
|
|
+ log_err(LD_BUG,"(Sandbox) failed to add chown syscall, received "
|
|
|
"libseccomp error %d", rc);
|
|
|
return rc;
|
|
|
}
|
|
@@ -1037,7 +1037,7 @@ sb_stat64(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
|
|
|
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(stat64),
|
|
|
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
|
|
|
if (rc != 0) {
|
|
|
- log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
|
|
|
+ log_err(LD_BUG,"(Sandbox) failed to add stat64 syscall, received "
|
|
|
"libseccomp error %d", rc);
|
|
|
return rc;
|
|
|
}
|