- (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to

remind myself to add sandbox violation logging via the log socket.
This commit is contained in:
Damien Miller 2014-03-17 14:45:56 +11:00
parent 9c36698ca2
commit 48abc47e60
2 changed files with 7 additions and 0 deletions

View File

@ -1,3 +1,7 @@
20140317
- (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
remind myself to add sandbox violation logging via the log socket.
20140314
- (tim) [opensshd.init.in] Add support for ed25519

View File

@ -25,6 +25,8 @@
*/
/* #define SANDBOX_SECCOMP_FILTER_DEBUG 1 */
/* XXX it should be possible to do logging via the log socket safely */
#ifdef SANDBOX_SECCOMP_FILTER_DEBUG
/* Use the kernel headers in case of an older toolchain. */
# include <asm/siginfo.h>
@ -89,6 +91,7 @@ static const struct sock_filter preauth_insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_ABS,
offsetof(struct seccomp_data, nr)),
SC_DENY(open, EACCES),
SC_DENY(stat, EACCES),
SC_ALLOW(getpid),
SC_ALLOW(gettimeofday),
SC_ALLOW(clock_gettime),