Allow adding syscalls by group names #18
Notiek ielāde…
x
Atsaukties uz šo jaunā problēmā
Block a user
Nav sniegts apraksts.
Dzēst atzaru "%!s()"
Atzara dzēšana ir neatgriezeniska. Kaut arī izdzēstais zars neilgu laiku var turpināt pastāvēt, pirms tas tiešām tiek noņemts, to vairumā gadījumu NEVAR atsaukt. Vai turpināt?
If you add "open", there is a chance you also want to block "openat"...
So make this easy by allow adding system call by group names to the policy.
Also, maybe take some inspiration from pledge().
If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet.
Thus, we may habe to auto blacklist all those that we do not know.
Alternatively, adding syscalls by groups should only be allowed for whitelisting?