From 63e9d849f662d1a494c6396d4a439cd4c91dfa7e Mon Sep 17 00:00:00 2001 From: Topi Miettinen Date: Sun, 13 Aug 2017 14:07:31 +0300 Subject: Allow any syscall to be blacklisted (#1447) Allow any syscall to be blacklisted with aid of LD_PRELOAD library, libpostexecseccomp.so. Closes: #1447 --- src/fseccomp/seccomp_file.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) (limited to 'src/fseccomp/seccomp_file.c') diff --git a/src/fseccomp/seccomp_file.c b/src/fseccomp/seccomp_file.c index 16ffd5302..2d5ee115d 100644 --- a/src/fseccomp/seccomp_file.c +++ b/src/fseccomp/seccomp_file.c @@ -60,8 +60,9 @@ void filter_init(int fd) { write_to_file(fd, filter, sizeof(filter)); } -void filter_add_whitelist(int fd, int syscall, int arg) { +void filter_add_whitelist(int fd, int syscall, int arg, void *ptrarg) { (void) arg; + (void) ptrarg; struct sock_filter filter[] = { WHITELIST(syscall) @@ -69,8 +70,9 @@ void filter_add_whitelist(int fd, int syscall, int arg) { write_to_file(fd, filter, sizeof(filter)); } -void filter_add_blacklist(int fd, int syscall, int arg) { +void filter_add_blacklist(int fd, int syscall, int arg, void *ptrarg) { (void) arg; + (void) ptrarg; struct sock_filter filter[] = { BLACKLIST(syscall) @@ -78,7 +80,8 @@ void filter_add_blacklist(int fd, int syscall, int arg) { write_to_file(fd, filter, sizeof(filter)); } -void filter_add_errno(int fd, int syscall, int arg) { +void filter_add_errno(int fd, int syscall, int arg, void *ptrarg) { + (void) ptrarg; struct sock_filter filter[] = { BLACKLIST_ERRNO(syscall, arg) }; -- cgit v1.2.3-54-g00ecf