Commit Graph

  • ce7eb57998 enter_namespaces(): Fix error message Albert S 2021-12-27 00:49:09 +01:00
  • 3407fded04 Add EXILE_FS_ALLOW_ALL_{READ,WRITE} Albert S 2021-12-24 16:20:14 +01:00
  • 1b4c5477a5 rename to exile.h Albert S 2021-11-30 17:57:48 +01:00
  • 756b0fb421 rename qssb.h to exile.h Albert S 2021-11-30 17:40:36 +01:00
  • d150c2ecd9 Don't add any seccomp rules by default Albert S 2021-11-20 20:21:51 +01:00
  • 435bcefa48 test: Skip landlock specific tests if unavailble during compile time Albert S 2021-11-20 17:03:04 +01:00
  • 2a4cee2ece test: Use xqssb_enable_policy() throughout where reasonable Albert S 2021-11-20 16:56:19 +01:00
  • d847d0f996 qssb_append_group_syscall_policy(): Make QSSB_SYSCGROUP_NONE an invalid group Albert S 2021-11-14 21:46:38 +01:00
  • 1a2443db18 qssb_append_syscalls_policy(): Fix mem leak on failure Albert S 2021-11-09 10:02:56 +01:00
  • db17e58deb Assign syscalls into groups. Add whitelist mode (default). Albert S 2021-09-19 15:23:41 +02:00
  • 265a19d351 Assign syscalls into groups. Add whitelist mode (default). Albert S 2021-09-19 15:23:41 +02:00
  • 0d7c5bd6d4 append_syscall_to_bpf(): Explicit type cast to fix (C++) warnings Albert S 2021-10-25 18:18:01 +02:00
  • 55e1f42ca8 check_policy_sanity(): Initialize last_policy Albert S 2021-10-03 21:25:37 +02:00
  • 11d64c6fcf enter_namespaces(): Check fopen/fprintf errors Albert S 2021-09-12 20:00:03 +02:00
  • ebe043c08d Fix missing \n in some error outputs Albert S 2021-09-12 19:50:05 +02:00
  • 8bc0d1e73a Use overflow-safe operator builtins Albert S 2021-09-12 19:41:07 +02:00
  • 215032f32c enable_no_fs(): Fix corresponding test by adding missing default policy Albert S 2021-09-06 21:43:50 +02:00
  • 411e00715d Rename qssb_append_default_syscall_policy() to better distinguish it from qssb_append_syscall_default_policy() Albert S 2021-09-05 17:24:42 +02:00
  • 8a9b1730de test: Remove argc,argv from tests as there was no use for them Albert S 2021-09-05 16:53:39 +02:00
  • b2b501d97e test: Refactor: Put seccomp tests into child processes ; Simplfy .sh Albert S 2021-09-05 16:48:27 +02:00
  • 26f391f736 test: implement test_seccomp_errno() Albert S 2021-09-05 12:31:16 +02:00
  • 68fd1a0a87 test: test_seccomp_blacklisted_call_permitted(): Add missing default policy Albert S 2021-09-05 12:30:12 +02:00
  • b0d0beab22 README.md: Update Albert S 2021-08-16 23:33:36 +02:00
  • c44ce85628 test: Add test ensuring seccomp ends with default rule, minor fixes Albert S 2021-08-16 23:32:27 +02:00
  • 25d8ed9bca check_policy_sanity(): Add syscall policy checks Albert S 2021-08-16 23:33:25 +02:00
  • e389140436 test.sh: Log exit code, print yes/no instead of 1/0 Albert S 2021-08-16 23:08:16 +02:00
  • f6af1bb78f policy: Add disable_syscall_filter policy. Add defaults only on enable. Albert S 2021-08-15 18:31:13 +02:00
  • 9192ec3aa4 Rewrite syscall policy logic Albert S 2021-08-12 21:58:45 +02:00
  • 51844ea3ab bpf: Deny x32 system calls for now Albert S 2021-08-12 12:25:12 +02:00
  • 66c6d28dcd bpf: Check arch value Albert S 2021-08-12 11:57:12 +02:00
  • 5cd45c09b7 bpf: Use SECCOMP_RET_KILL_PROCESS instead SECCOMP_RET_KILL Albert S 2021-08-12 11:40:29 +02:00
  • fa06287b13 Use new qssb_append_*_syscall functions, remove old fields Albert S 2021-08-11 20:54:40 +02:00
  • 68694723fe Begin qssb_append_*_syscall family of functions Albert S 2021-08-11 19:14:06 +02:00
  • 4a4d551e75 Introduce "no_fs" and "no_new_fd" options. Albert S 2021-08-09 20:29:18 +02:00
  • 57238b535c Expand disallowed system calls Albert S 2021-08-10 16:57:44 +02:00
  • b4e8116c20 seccomp_enable_whitelist(): Fix comment Albert S 2021-08-10 16:55:58 +02:00
  • 75f607bc35 qssb_append_path_policies(): Add explicit type cast for c++ Albert S 2021-08-07 12:05:58 +02:00
  • a585db7778 qssb_free_policy(): Allow passing NULL Albert S 2021-06-08 12:35:07 +02:00
  • 55ec51ba21 Improve and add functions comments Albert S 2021-05-22 21:07:35 +02:00
  • ade022ba62 update README Albert S 2021-05-22 20:51:09 +02:00
  • c57c79fa36 test: Log output of individual tests Albert S 2021-06-06 09:27:45 +02:00
  • 5138d88b12 test: Count succeeded/failed tests Albert S 2021-06-06 09:02:30 +02:00
  • b8d6c78780 test: Rename fail(), echogreen() Albert S 2021-06-06 08:57:24 +02:00
  • a7c04537f7 Rename allowed_syscalls to whitelisted_syscalls for consistency Albert S 2021-06-05 20:15:09 +02:00
  • 85c01899a9 Start implementing tests Albert S 2021-06-05 14:07:11 +02:00
  • 0b13f551f4 Fix stray = in #define Albert S 2021-06-05 14:03:42 +02:00
  • bb07b95993 Fix stray semicolon Albert S 2021-06-05 11:55:50 +02:00
  • d070268fca Add more system calls to blacklist Albert S 2021-05-29 23:15:04 +02:00
  • d6f4a37de8 Remove unused qssb_end_policy() Albert S 2021-05-22 22:36:01 +02:00
  • afb429e124 qssb_policy: Remove unused syscall_default_policy member Albert S 2021-05-22 22:35:12 +02:00
  • 045b7b9b2c Improve and add functions comments Albert S 2021-05-22 21:07:35 +02:00
  • 4b8aa4b7e1 update README Albert S 2021-05-22 20:51:09 +02:00
  • 946492c28e qssb_free_policy(): free path policies Albert S 2021-05-15 21:26:28 +02:00
  • ad9c391e3f QSSB_FS_ALLOW_WRITE does not imply ALLOW_READ anymore Albert S 2021-05-15 20:41:19 +02:00
  • fcebed557c Add qssb_append_path_polic{ies,y}: Convenience function to add path policies Albert S 2021-05-15 20:40:11 +02:00
  • bb02e40101 Begin landlock support Albert S 2021-05-13 18:21:37 +02:00
  • 7e2d4139cb Begin check_policy_sanity(): Checks whether policy is reasonable Albert S 2021-05-09 12:57:14 +02:00
  • 6e6812e13d Introduce mount_path_policies_to_chroot option, changing path_policy enforcement logic Albert S 2021-05-09 12:29:03 +02:00
  • edf144bbc7 Allow overriding HAVE_LANDLOCK irrespectible of kernel verison Albert S 2021-05-09 12:27:34 +02:00
  • 67e1afc904 Remove unused policy flag QSSB_FS_ALLOW_NOTHING Albert S 2021-05-09 12:21:15 +02:00
  • 2c94fe8225 qssb_path_policy: rename 'mountpoint' to 'path', make 'policy' unsigned Albert S 2021-05-09 11:56:44 +02:00
  • 4674638e9a Add landlock policy flags if landlock is supported Albert S 2021-05-09 11:55:58 +02:00
  • 8697fd8b84 qssb.h: Add copyright header Albert S 2021-05-09 10:02:31 +02:00
  • ed6a2a1067 Rename general QSSB_MOUNT* flags to QSSB_FS* Albert S 2021-05-09 09:35:17 +02:00
  • 9df2e9ee90 seccomp_enable(): Replace param types with correct unsigned int versions Albert S 2021-04-18 13:24:49 +02:00
  • 23f697bcc9 Update README.md: Update example projects links, minor improvements Albert S 2020-09-26 17:21:28 +02:00
  • 763c65c3fe qssb_enable_policy: check for empty str instead of NULL ptr Albert S 2020-09-26 16:09:43 +02:00
  • dbdb35db37 Remove wrong static keywords from some qssb_*_policy functions Albert S 2020-04-13 23:00:33 +02:00
  • 0a851790b8 change chroot_target_path from pointer to array Albert S 2020-04-13 22:50:30 +02:00
  • 60776be416 only chdir to / by default when actually chrooting and no dir given Albert S 2019-12-07 23:44:55 +01:00
  • ff2bc24c6b only create chroot directory when path policies are available Albert S 2019-12-07 23:26:27 +01:00
  • 7547644013 silence multiple compiler warnings Albert S 2019-11-17 15:13:25 +01:00
  • 8f104a231c bugfix: qssb_enable_policy: pointer to stack-local variable Albert S 2019-11-17 12:45:01 +01:00
  • fbf51e095f introduce path policies, replacing readonly/writable paths vars Albert S 2019-11-16 21:17:38 +01:00
  • 1b8504c052 updated README Albert S 2019-11-15 21:53:26 +01:00
  • 6f1b27ee51 qssb_init_policy: explicit cast (for C++) Albert S 2019-11-15 21:40:56 +01:00
  • ee6bd18027 begin a default blacklist of syscalls Albert S 2019-11-15 21:17:33 +01:00
  • 8298a30e7c make PATH_MAX consistent across all buffers throughout the code Albert S 2019-11-10 12:29:46 +01:00
  • 338e578350 seccomp_enable: fix unused default_action parameter Albert S 2019-11-10 12:10:37 +01:00
  • 069349eaf6 generate a random directory for chroot if none given Albert S 2019-11-10 12:08:35 +01:00
  • 1de1ae0b32 introduce bitmasks indicating which namespaces to unshare Albert S 2019-11-09 21:13:40 +01:00
  • bad600b3a8 set #defines only if not set already Albert S 2019-11-09 20:55:03 +01:00
  • a7c6ef6c57 bind mount recursively Albert S 2019-11-09 16:27:54 +01:00
  • 7a2cf18c19 check drop_caps() return value ; silence compiler warning Albert S 2019-11-09 15:47:08 +01:00
  • 200cd7878c Initial commit Albert S 2019-10-13 17:57:12 +02:00