Expand description
§libsyd - syd API Rust Library
libsyd is a C library written in Rust that implements the syd
stat API, providing an interface to the /dev/syd of syd. It
allows for runtime configuration and interaction with the syd
sandboxing environment.
§Overview
The library is designed to interact with the syd sandboxing
environment, offering functionalities to check and modify the state
of the sandbox lock, and perform system calls to /dev/syd.
For more detailed information and usage instructions, refer to the syd manual, available at syd Manual.
§Author
Ali Polatel alip@chesswob.org
Enums§
- An enumeration of the possible actions for sandboxing.
- An enumeration of the possible states for the sandbox lock.
Functions§
- Performs a syd API check
- Performs an lstat system call on the file “/dev/syd”.
- Set the default action for Exec Sandboxing.
- Set the default action for Force Sandboxing.
- Set the default action for Ioctl Sandboxing.
- Set the default action for Memory Sandboxing.
- Set the default action for Network Sandboxing.
- Set the default action for PID Sandboxing.
- Set the default action for Read Sandboxing.
- Set the default action for SegvGuard
- Set the default action for Stat Sandboxing.
- Set the default action for TPE Sandboxing.
- Set the default action for Write Sandboxing.
- Disable exec sandboxing.
- Disable force sandboxing.
- Disable ioctl sandboxing.
- Disable memory sandboxing.
- Disable net sandboxing.
- Disable PID sandboxing.
- Disable read sandboxing.
- Disable stat sandboxing.
- Disable TPE sandboxing.
- Disable write sandboxing.
- Enable exec sandboxing.
- Enable force sandboxing.
- Enable ioctl sandboxing.
- Enable memory sandboxing.
- Enable net sandboxing.
- Enable PID sandboxing.
- Enable read sandboxing.
- Enable stat sandboxing.
- Enable TPE sandboxing.
- Enable write sandboxing.
- Checks if exec sandboxing is enabled.
- Checks if force sandboxing is enabled.
- Checks if ioctl sandboxing is enabled.
- Checks if memory sandboxing is enabled.
- Checks if net sandboxing is enabled.
- Checks if PID sandboxing is enabled.
- Checks if read sandboxing is enabled.
- Checks if stat sandboxing is enabled.
- Checks if TPE sandboxing is enabled.
- Checks if write sandboxing is enabled.
- Execute a command outside the sandbox without sandboxing
- Adds to the given actionlist of exec sandboxing.
- Removes the first instance from the end of the given actionlist of exec sandboxing.
- Removes all matching patterns from the given actionlist of exec sandboxing.
- Adds an entry to the Integrity Force map for Force Sandboxing.
- Clears the Integrity Force map for Force Sandboxing.
- Removes an entry from the Integrity Force map for Force Sandboxing.
- Adds to the given actionlist of ioctl sandboxing.
- Removes the first instance from the end of the given actionlist of ioctl sandboxing.
- Adds a request to the ioctl(2) denylist.
- Removes all matching patterns from the given actionlist of ioctl sandboxing.
- Causes syd to read configuration from the given file descriptor.
- Sets the state of the sandbox lock.
- Set syd maximum per-process memory usage limit for memory sandboxing.
- Set syd maximum per-process virtual memory usage limit for memory sandboxing.
- Adds to the given actionlist of net/bind sandboxing.
- Removes the first instance from the end of the given actionlist of net/bind sandboxing.
- Removes all matching patterns from the given actionlist of net/bind sandboxing.
- Adds to the given actionlist of net/connect sandboxing.
- Removes the first instance from the end of the given actionlist of net/connect sandboxing.
- Removes all matching patterns from the given actionlist of net/connect sandboxing.
- Causes syd to exit immediately with code 127
- Set syd maximum process id limit for PID sandboxing
- Adds to the given actionlist of read sandboxing.
- Removes the first instance from the end of the given actionlist of read sandboxing.
- Removes all matching patterns from the given actionlist of read sandboxing.
- Causes syd to reset sandboxing to the default state. Allowlists, denylists and filters are going to be cleared.
- Specify SegvGuard entry expiry timeout in seconds. Setting this timeout to 0 effectively disables SegvGuard.
- Specify SegvGuard max number of crashes before suspension.
- Specify SegvGuard entry suspension timeout in seconds.
- Adds to the given actionlist of stat sandboxing.
- Removes the first instance from the end of the given actionlist of stat sandboxing.
- Removes all matching patterns from the given actionlist of stat sandboxing.
- Adds to the given actionlist of write sandboxing.
- Removes the first instance from the end of the given actionlist of write sandboxing.
- Removes all matching patterns from the given actionlist of write sandboxing.