Eunomia  0.1.0
A lightweight eBPF-based CloudNative Monitor tool for Container Security and Observability
myseccomp.h File Reference
#include <linux/filter.h>
#include <linux/seccomp.h>
#include <malloc.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/prctl.h>
#include <time.h>
#include <unistd.h>
#include <string>
#include <vector>
#include "config.h"
#include "seccomp-bpf.h"
#include "syscall_helper.h"
Include dependency graph for myseccomp.h:
This graph shows which files directly or indirectly include this file:

Go to the source code of this file.

Macros

#define _GNU_SOURCE   1
 

Functions

bool is_not_allow (const std::vector< uint32_t > &syscall_vec, uint32_t id)
 if a system call is not in the list, it will be allowed More...
 
int get_syscall_id (std::string syscall_name)
 
int enable_seccomp_white_list (const seccomp_config &config)
 Enable Seccomp syscall. More...
 

Macro Definition Documentation

◆ _GNU_SOURCE

#define _GNU_SOURCE   1

Function Documentation

◆ enable_seccomp_white_list()

int enable_seccomp_white_list ( const seccomp_config config)

Enable Seccomp syscall.

param seccomp_config type is defined by include/eunomia/config.h

Here is the call graph for this function:
Here is the caller graph for this function:

◆ get_syscall_id()

int get_syscall_id ( std::string  syscall_name)
Here is the call graph for this function:
Here is the caller graph for this function:

◆ is_not_allow()

bool is_not_allow ( const std::vector< uint32_t > &  syscall_vec,
uint32_t  id 
)

if a system call is not in the list, it will be allowed