Allow adding syscalls by group names #18

zavřený
otevřeno 2021-09-06 22:35:05 +02:00 uživatelem crtxcr · 1 komentář
Vlastník

If you add "open", there is a chance you also want to block "openat"...

So make this easy by allow adding system call by group names to the policy.

Also, maybe take some inspiration from pledge().

If you add "open", there is a chance you also want to block "openat"... So make this easy by allow adding system call by group names to the policy. Also, maybe take some inspiration from pledge().
crtxcr přidal/a
enhancement
štítek 2021-09-06 22:35:05 +02:00
Autor
Vlastník

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet.

Thus, we may habe to auto blacklist all those that we do not know.

Alternatively, adding syscalls by groups should only be allowed for whitelisting?

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet. Thus, we may habe to auto blacklist all those that we do not know. Alternatively, adding syscalls by groups should only be allowed for whitelisting?
crtxcr uzavřel/a tento úkol 2021-11-20 19:52:05 +01:00
Přihlaste se pro zapojení do konverzace.
Bez milníku
Bez zpracovatelů
1 účastníků
Oznámení
Termín dokončení
Termín dokončení není platný nebo je mimo rozsah. Použijte prosím formát „rrrr-mm-dd“.

Žádný termín dokončení.

Závislosti

Nejsou nastaveny žádné závislosti.

Reference: crtxcr/exile.h#18
K dispozici není žádný popis.