Expand description
§libsyd - syd API Rust Library
libsyd is a C library written in Rust that implements the syd
stat API, providing an interface to the /dev/syd of syd. It
allows for runtime configuration and interaction with the syd
sandboxing environment.
§Overview
The library is designed to interact with the syd sandboxing
environment, offering functionalities to check and modify the state
of the sandbox lock, and perform system calls to /dev/syd.
For more detailed information and usage instructions, refer to the syd manual, available at syd Manual.
§Author
Ali Polatel alip@chesswob.org
Enums§
- An enumeration of the possible actions for sandboxing.
- An enumeration of the possible states for the sandbox lock.
Functions§
- Performs a syd API check
- Adds to the given actionlist of attr sandboxing.
- Removes the first instance from the end of the given actionlist of attr sandboxing.
- Removes all matching patterns from the given actionlist of attr sandboxing.
- Performs an lstat system call on the file “/dev/syd”.
- Adds to the given actionlist of chgrp sandboxing.
- Removes the first instance from the end of the given actionlist of chgrp sandboxing.
- Removes all matching patterns from the given actionlist of chgrp sandboxing.
- Adds to the given actionlist of chown sandboxing.
- Removes the first instance from the end of the given actionlist of chown sandboxing.
- Removes all matching patterns from the given actionlist of chown sandboxing.
- Adds to the given actionlist of create sandboxing.
- Removes the first instance from the end of the given actionlist of create sandboxing.
- Removes all matching patterns from the given actionlist of create sandboxing.
- Set the default action for Attr Sandboxing.
- Set the default action for IP blocklist violations.
- Set the default action for Chgrp Sandboxing.
- Set the default action for Chown Sandboxing.
- Set the default action for Create Sandboxing.
- Set the default action for Delete Sandboxing.
- Set the default action for Exec Sandboxing.
- Set the default action for Force Sandboxing.
- Set the default action for Ioctl Sandboxing.
- Set the default action for Memory Sandboxing.
- Set the default action for Network Sandboxing.
- Set the default action for Node Sandboxing.
- Set the default action for PID Sandboxing.
- Set the default action for Read Sandboxing.
- Set the default action for SegvGuard
- Set the default action for Stat Sandboxing.
- Set the default action for Tmpfile Sandboxing.
- Set the default action for TPE Sandboxing.
- Set the default action for Truncate Sandboxing.
- Set the default action for Write Sandboxing.
- Adds to the given actionlist of delete sandboxing.
- Removes the first instance from the end of the given actionlist of delete sandboxing.
- Removes all matching patterns from the given actionlist of delete sandboxing.
- Disable attr sandboxing.
- Disable chgrp sandboxing.
- Disable chown sandboxing.
- Disable create sandboxing.
- Disable delete sandboxing.
- Disable exec sandboxing.
- Disable force sandboxing.
- Disable ioctl sandboxing.
- Disable memory sandboxing.
- Disable net sandboxing.
- Disable node sandboxing.
- Disable PID sandboxing.
- Disable read sandboxing.
- Disable stat sandboxing.
- Disable tmpfile sandboxing.
- Disable TPE sandboxing.
- Disable truncate sandboxing.
- Disable write sandboxing.
- Enable attr sandboxing.
- Enable chgrp sandboxing.
- Enable chown sandboxing.
- Enable create sandboxing.
- Enable delete sandboxing.
- Enable exec sandboxing.
- Enable force sandboxing.
- Enable ioctl sandboxing.
- Enable memory sandboxing.
- Enable net sandboxing.
- Enable node sandboxing.
- Enable PID sandboxing.
- Enable read sandboxing.
- Enable stat sandboxing.
- Enable tmpfile sandboxing.
- Enable TPE sandboxing.
- Enable truncate sandboxing.
- Enable write sandboxing.
- Checks if attr sandboxing is enabled.
- Checks if chgrp sandboxing is enabled.
- Checks if chown sandboxing is enabled.
- Checks if create sandboxing is enabled.
- Checks if crypt sandboxing is enabled.
- Checks if delete sandboxing is enabled.
- Checks if exec sandboxing is enabled.
- Checks if force sandboxing is enabled.
- Checks if ioctl sandboxing is enabled.
- Checks if lock sandboxing is enabled.
- Checks if memory sandboxing is enabled.
- Checks if net sandboxing is enabled.
- Checks if node sandboxing is enabled.
- Checks if PID sandboxing is enabled.
- Checks if proxy sandboxing is enabled.
- Checks if read sandboxing is enabled.
- Checks if stat sandboxing is enabled.
- Checks if tmpfile sandboxing is enabled.
- Checks if TPE sandboxing is enabled.
- Checks if truncate sandboxing is enabled.
- Checks if write sandboxing is enabled.
- Execute a command outside the sandbox without sandboxing
- Adds to the given actionlist of exec sandboxing.
- Removes the first instance from the end of the given actionlist of exec sandboxing.
- Removes all matching patterns from the given actionlist of exec sandboxing.
- Adds an entry to the Integrity Force map for Force Sandboxing.
- Clears the Integrity Force map for Force Sandboxing.
- Removes an entry from the Integrity Force map for Force Sandboxing.
- Adds to the given actionlist of ioctl sandboxing.
- Removes the first instance from the end of the given actionlist of ioctl sandboxing.
- Adds a request to the ioctl(2) denylist.
- Removes all matching patterns from the given actionlist of ioctl sandboxing.
- Causes syd to read configuration from the given file descriptor.
- Sets the state of the sandbox lock.
- Set syd maximum per-process memory usage limit for memory sandboxing.
- Set syd maximum per-process virtual memory usage limit for memory sandboxing.
- Adds to the given actionlist of net/bind sandboxing.
- Removes the first instance from the end of the given actionlist of net/bind sandboxing.
- Removes all matching patterns from the given actionlist of net/bind sandboxing.
- Adds to the given actionlist of net/connect sandboxing.
- Removes the first instance from the end of the given actionlist of net/connect sandboxing.
- Removes all matching patterns from the given actionlist of net/connect sandboxing.
- Adds to the given actionlist of net/link sandboxing.
- Removes the first instance from the end of the given actionlist of net/link sandboxing.
- Removes all matching patterns from the given actionlist of net/link sandboxing.
- Adds to the given actionlist of net/send sandboxing.
- Removes the first instance from the end of the given actionlist of net/send sandboxing.
- Removes all matching patterns from the given actionlist of net/send sandboxing.
- Adds to the given actionlist of node sandboxing.
- Removes the first instance from the end of the given actionlist of node sandboxing.
- Removes all matching patterns from the given actionlist of node sandboxing.
- Causes syd to exit immediately with code 127
- Set syd maximum process id limit for PID sandboxing
- Adds to the given actionlist of read sandboxing.
- Removes the first instance from the end of the given actionlist of read sandboxing.
- Removes all matching patterns from the given actionlist of read sandboxing.
- Causes syd to reset sandboxing to the default state. Allowlists, denylists and filters are going to be cleared.
- Specify SegvGuard entry expiry timeout in seconds. Setting this timeout to 0 effectively disables SegvGuard.
- Specify SegvGuard max number of crashes before suspension.
- Specify SegvGuard entry suspension timeout in seconds.
- Adds to the given actionlist of stat sandboxing.
- Removes the first instance from the end of the given actionlist of stat sandboxing.
- Removes all matching patterns from the given actionlist of stat sandboxing.
- Adds to the given actionlist of tmpfile sandboxing.
- Removes the first instance from the end of the given actionlist of tmpfile sandboxing.
- Removes all matching patterns from the given actionlist of tmpfile sandboxing.
- Adds to the given actionlist of truncate sandboxing.
- Removes the first instance from the end of the given actionlist of truncate sandboxing.
- Removes all matching patterns from the given actionlist of truncate sandboxing.
- Adds to the given actionlist of write sandboxing.
- Removes the first instance from the end of the given actionlist of write sandboxing.
- Removes all matching patterns from the given actionlist of write sandboxing.