syd(3) User Contributed Perl Documentation syd(3)

plsyd - Perl Bindings for the syd API Rust Library

`plsyd` provides Perl bindings for `libsyd`, a C library written in Rust that implements the syd stat API. This package allows interaction with the `/dev/syd` interface of syd, enabling runtime configuration and interaction within the syd sandboxing environment.

The `plsyd` library is designed to interact with the syd sandboxing environment through Perl. It offers functionalities to check and modify the state of the sandbox lock, perform system calls to `/dev/syd`, and execute commands within the sandbox. This makes it easier for Perl applications to integrate with syd's features.

To use `plsyd`, the shared library `libsyd.so` must be available in the system's library search path. Ensure this shared library is properly installed and its location is included in the environment path where system libraries are searched for.

This library is currently a work in progress. The API is subject to change and may not be stable. Users are advised to use it with caution and to stay updated with the latest changes.

For more detailed information about `libsyd` and usage instructions, refer to the syd manual: <https://git.sr.ht/~alip/syd>. To read `libsyd` API documentation, see <https://libsyd.exherbolinux.org>.

Ali Polatel (alip@chesswob.org)

This software is licensed under the LGPL-3.0 license.

Performs an lstat system call on the file "/dev/syd".

Non-zero on successful operation, or croaks on failure.

Performs a syd API check. The caller is advised to perform this check before calling any other syd API calls.

Non-zero on successful operation, or croaks on failure.

Causes syd to exit immediately with code 127.

Returns

Non-zero on successful operation, or croaks on failure.

Causes syd to reset sandboxing to the default state. Allowlists, denylists and filters are going to be cleared.

Returns

Non-zero on successful operation, or croaks on failure.

Causes syd to read configuration from the given file descriptor.

Parameters
The file descriptor to read the configuration from.
Returns

Non-zero on successful operation, or croaks on failure.

Sets the state of the sandbox lock.

Args
The desired state of the sandbox lock, possible values are:
  • LOCK_OFF

    The sandbox lock is off, allowing all sandbox commands.

  • LOCK_EXEC

    The sandbox lock is set to on for all processes except the initial process (syd exec child). This is the default state.

  • LOCK_ON

    The sandbox lock is on, disallowing all sandbox commands.

Returns

Non-zero on successful operation, or croaks on failure.

Execute a command outside the sandbox without sandboxing.

Parameters
The file path of the command to be executed, as a string.
The arguments to the command, as a list of strings.
Returns

Non-zero on successful operation, or croaks on failure.

Enables Stat sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables Stat sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if Stat sandboxing is enabled.

Returns

Non-zero if Stat sandboxing is enabled, zero otherwise.

Enables read sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables read sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if read sandboxing is enabled.

Returns

Non-zero if read sandboxing is enabled, zero otherwise.

Enables Write sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables Write sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if Write sandboxing is enabled.

Returns

Non-zero if Write sandboxing is enabled, zero otherwise.

Enables Exec sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables Exec sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if Exec sandboxing is enabled.

Returns

Non-zero if Exec sandboxing is enabled, zero otherwise.

Enables ioctl sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables ioctl sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if ioctl sandboxing is enabled.

Returns

Non-zero if ioctl sandboxing is enabled, zero otherwise.

Enables create sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables create sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if create sandboxing is enabled.

Returns

Non-zero if create sandboxing is enabled, zero otherwise.

Enables delete sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables delete sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if delete sandboxing is enabled.

Returns

Non-zero if delete sandboxing is enabled, zero otherwise.

Enables rename sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables rename sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if rename sandboxing is enabled.

Returns

Non-zero if rename sandboxing is enabled, zero otherwise.

Enables symlink sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables symlink sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if symlink sandboxing is enabled.

Returns

Non-zero if symlink sandboxing is enabled, zero otherwise.

Enables truncate sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables truncate sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if truncate sandboxing is enabled.

Returns

Non-zero if truncate sandboxing is enabled, zero otherwise.

Enables chdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chdir sandboxing is enabled.

Returns

Non-zero if chdir sandboxing is enabled, zero otherwise.

Enables readdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables readdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if readdir sandboxing is enabled.

Returns

Non-zero if readdir sandboxing is enabled, zero otherwise.

Enables mkdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables mkdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if mkdir sandboxing is enabled.

Returns

Non-zero if mkdir sandboxing is enabled, zero otherwise.

Enables rmdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables rmdir sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if rmdir sandboxing is enabled.

Returns

Non-zero if rmdir sandboxing is enabled, zero otherwise.

Enables chown sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chown sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chown sandboxing is enabled.

Returns

Non-zero if chown sandboxing is enabled, zero otherwise.

Enables chgrp sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chgrp sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chgrp sandboxing is enabled.

Returns

Non-zero if chgrp sandboxing is enabled, zero otherwise.

Enables chmod sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chmod sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chmod sandboxing is enabled.

Returns

Non-zero if chmod sandboxing is enabled, zero otherwise.

Enables chattr sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chattr sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chattr sandboxing is enabled.

Returns

Non-zero if chattr sandboxing is enabled, zero otherwise.

Enables chroot sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables chroot sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if chroot sandboxing is enabled.

Returns

Non-zero if chroot sandboxing is enabled, zero otherwise.

Enables utime sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables utime sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if utime sandboxing is enabled.

Returns

Non-zero if utime sandboxing is enabled, zero otherwise.

Enables mkdev sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables mkdev sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if mkdev sandboxing is enabled.

Returns

Non-zero if mkdev sandboxing is enabled, zero otherwise.

Enables mkfifo sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables mkfifo sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if mkfifo sandboxing is enabled.

Returns

Non-zero if mkfifo sandboxing is enabled, zero otherwise.

Enables mktemp sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables mktemp sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if mktemp sandboxing is enabled.

Returns

Non-zero if mktemp sandboxing is enabled, zero otherwise.

Enables net sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables net sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if net sandboxing is enabled.

Returns

Non-zero if net sandboxing is enabled, zero otherwise.

Checks if lock sandboxing is enabled.

Returns

Non-zero if lock sandboxing is enabled, zero otherwise.

Checks if crypt sandboxing is enabled.

Returns

Non-zero if crypt sandboxing is enabled, zero otherwise.

Checks if proxy sandboxing is enabled.

Returns

Non-zero if proxy sandboxing is enabled, zero otherwise.

Enables memory sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables memory sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if memory sandboxing is enabled.

Returns

Non-zero if memory sandboxing is enabled, zero otherwise.

Enables PID sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables PID sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if PID sandboxing is enabled.

Returns

Non-zero if PID sandboxing is enabled, zero otherwise.

Enables force sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables force sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if force sandboxing is enabled.

Returns

Non-zero if force sandboxing is enabled, zero otherwise.

Enables TPE sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Disables TPE sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Checks if TPE sandboxing is enabled.

Returns

Non-zero if TPE sandboxing is enabled, zero otherwise.

Set the default action for Stat sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Read Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Write sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Exec sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for _ioctl_(2) sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for create Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for delete Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for rename Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for symlink Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for truncate sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chdir sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for readdir sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for mkdir sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for rmdir sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chown Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chgrp Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chmod Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chattr Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for chroot Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for utime Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for mkdev Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for mkfifo Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for mktemp Sandboxing.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Network Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for block Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Memory Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for PID Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for Force Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for SegvGuard.

The default action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Set the default action for TPE Sandboxing.

The default action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of Stat sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of Stat sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of Stat sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of Read sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of Read sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of Read sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of Write sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of Write sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of Write sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of Exec sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of Exec sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of Exec sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of _ioctl_(2) sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of _ioctl_(2) sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of _ioctl_(2) sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of create sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of create sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of create sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of delete sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of delete sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of delete sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of rename sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of rename sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of rename sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of symlink sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of symlink sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of symlink sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of truncate sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of truncate sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of truncate sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of readdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of readdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of readdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of mkdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of mkdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of mkdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of rmdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of rmdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of rmdir sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chown sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chown sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chown sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chgrp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chgrp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chgrp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chmod sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chmod sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chmod sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chattr sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chattr sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chattr sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of chroot sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of chroot sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of chroot sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of utime sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of utime sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of utime sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of mkdev sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of mkdev sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of mkdev sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of mkfifo sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of mkfifo sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of mkfifo sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of mktemp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of mktemp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of mktemp sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of net/bind sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of net/bind sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of net/bind sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of net/connect sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of net/connect sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of net/connect sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of net/sendfd sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of net/sendfd sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of net/sendfd sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds to the given actionlist of net/link sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes the first instance from the end of the given actionlist of net/link sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Removes all matching patterns from the given actionlist of net/link sandboxing.

Parameters
The action, possible values are:
  • ACTION_ALLOW

    Allow system call.

  • ACTION_WARN

    Allow system call and warn.

  • ACTION_FILTER

    Deny system call silently.

  • ACTION_DENY

    Deny system call and warn.

  • ACTION_PANIC

    Deny system call, warn and panic the current Syd thread.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

  • ACTION_EXIT

    Warn, and exit Syd immediately with deny errno as exit value.

Glob pattern as a string.
Returns

Non-zero on successful operation, or croaks on failure.

Adds an entry to the Integrity Force map for Force Sandboxing.

Parameters
Fully-qualified file name as string.
Checksum as hexadecimal encoded string. This is either a 32-character MD5 checksum, a 40-character SHA1 checksum, a 64-character SHA3-256 checksum, a 96-character SHA3-384 checksum or a 128-character SHA3-512 checksum.
The action, possible values are:
  • ACTION_WARN

    Allow system call and warn.

  • ACTION_STOP

    Deny system call, warn and stop offending process.

  • ACTION_ABORT

    Deny system call, warn and abort offending process.

  • ACTION_KILL

    Deny system call, warn and kill offending process.

Returns

Non-zero on successful operation, or croaks on failure.

Removes an entry from the Integrity Force map for Force Sandboxing.

Parameters
Fully-qualified file name as string.
Returns

Non-zero on successful operation, or croaks on failure.

Clears the Integrity Force map for Force Sandboxing.

Returns

Non-zero on successful operation, or croaks on failure.

Specify SegvGuard entry expiry timeout in seconds. Setting this timeout to 0 effectively disables SegvGuard.

Parameters
Expiry timeout in seconds, must be greater than or equal to zero.
Returns

Non-zero on successful operation, or croaks on failure.

Specify SegvGuard entry suspension timeout in seconds.

Parameters
Suspension timeout in seconds, must be greater than or equal to zero.
Returns

Non-zero on successful operation, or croaks on failure.

Specify SegvGuard max number of crashes before suspension.

Parameters
Limit as u8, must be greater than or equal to zero.
Returns

Non-zero on successful operation, or croaks on failure.

Adds a request to the _ioctl_(2) denylist.

Parameters
_ioctl_(2) request to denylist.
Returns

Non-zero on successful operation, or croaks on failure.

Set syd maximum per-process memory usage limit for memory sandboxing. The parse-size crate is used to parse the value so formatted strings are OK.

Parameters
Limit size as a string, which can be formatted (e.g., '10MB', '512KB').
Returns

Non-zero on successful operation, or croaks on failure.

Set syd maximum per-process virtual memory usage limit for memory sandboxing, The parse-size crate is used to parse the value so formatted strings are OK.

Parameters
Limit size as a string, which can be formatted (e.g., '10MB', '512KB').
Returns

Non-zero on successful operation, or croaks on failure.

Set syd maximum process ID limit for PID sandboxing.

Parameters
Limit size, must be greater than or equal to zero.
Returns

Non-zero on successful operation, or croaks on failure.

2025-04-21 perl v5.40.1