Use cella's active syscall blocking mode to prevent containers from calling dangerous system calls like ptrace, mount, or kexec_load.
Navigate to the target container in the main list. This only works for LXD containers (not Docker).
Press Z to toggle LXD BPF syscall deny for the selected container.
cella sets security.syscalls.deny via the LXD API, which uses the kernel's BPF mechanism to block the following syscalls with EPERM:
ptrace — process debugging/injectionmount / umount2 — filesystem manipulationbpf — BPF program loadingkexec_load / kexec_file_load — kernel replacementreboot — host reboot from containerinit_module / finit_module — kernel module loadingWhen bpftrace detects an attempt to call a blocked syscall, an approval overlay appears:
Press Z again on the same container to remove the deny list.
Open the Policy panel (P) to see the current syscall blocking status for all containers — a ⛔ icon indicates active blocking.