Allow adding syscalls by group names #18

Закрыто
открыта 2021-09-06 22:35:05 +02:00 crtxcr · 1 комментарий
crtxcr прокомментировал(а) 2021-09-06 22:35:05 +02:00
Владелец

If you add "open", there is a chance you also want to block "openat"...

So make this easy by allow adding system call by group names to the policy.

Also, maybe take some inspiration from pledge().

If you add "open", there is a chance you also want to block "openat"... So make this easy by allow adding system call by group names to the policy. Also, maybe take some inspiration from pledge().
crtxcr добавил(а) метку
enhancement
2021-09-06 22:35:05 +02:00
crtxcr прокомментировал(а) 2021-09-18 22:55:42 +02:00
Автор
Владелец

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet.

Thus, we may habe to auto blacklist all those that we do not know.

Alternatively, adding syscalls by groups should only be allowed for whitelisting?

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet. Thus, we may habe to auto blacklist all those that we do not know. Alternatively, adding syscalls by groups should only be allowed for whitelisting?
crtxcr закрыл(а) эту задачу 2021-11-20 19:52:05 +01:00
Войдите, чтобы присоединиться к обсуждению.
Нет этапа
Нет назначенных лиц
1 участников
Уведомления
Срок выполнения
Срок действия недействителен или находится за пределами допустимого диапазона. Пожалуйста, используйте формат 'гггг-мм-дд'.

Срок выполнения не установлен.

Зависимости

Зависимостей нет.

Ссылка: crtxcr/exile.h#18
Описание отсутствует.