diff options
author | Topi Miettinen <toiwoton@gmail.com> | 2020-08-30 20:56:13 +0200 |
---|---|---|
committer | Topi Miettinen <toiwoton@gmail.com> | 2020-09-15 11:54:17 +0200 |
commit | 9df2cdd8ec1cc223d74fd06eeb89d822f72f61c3 (patch) | |
tree | 8a3f3a39b5311905c97221bb99d04dc428f023de /man/systemd.exec.xml | |
parent | exec: Add kill action to system call filters (diff) | |
download | systemd-9df2cdd8ec1cc223d74fd06eeb89d822f72f61c3.tar.xz systemd-9df2cdd8ec1cc223d74fd06eeb89d822f72f61c3.zip |
exec: SystemCallLog= directive
With new directive SystemCallLog= it's possible to list system calls to be
logged. This can be used for auditing or temporarily when constructing system
call filters.
---
v5: drop intermediary, update HASHMAP_FOREACH_KEY() use
v4: skip useless debug messages, actually parse directive
v3: don't declare unused variables with old libseccomp
v2: fix build without seccomp or old libseccomp
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r-- | man/systemd.exec.xml | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 46fa900894..d0bb5fc962 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -2136,6 +2136,21 @@ SystemCallErrorNumber=EPERM</programlisting> details.</para></listitem> </varlistentry> + <varlistentry> + <term><varname>SystemCallLog=</varname></term> + + <listitem><para>Takes a space-separated list of system call names. If this setting is used, all + system calls executed by the unit processes for the listed ones will be logged. If the first + character of the list is <literal>~</literal>, the effect is inverted: all system calls except the + listed system calls will be logged. If running in user mode, or in system mode, but without the + <constant>CAP_SYS_ADMIN</constant> capability (e.g. setting <varname>User=nobody</varname>), + <varname>NoNewPrivileges=yes</varname> is implied. This feature makes use of the Secure Computing + Mode 2 interfaces of the kernel ('seccomp filtering') and is useful for auditing or setting up a + minimal sandboxing environment. This option may be specified more than once, in which case the filter + masks are merged. If the empty string is assigned, the filter is reset, all prior assignments will + have no effect. This does not affect commands prefixed with <literal>+</literal>.</para></listitem> + </varlistentry> + </variablelist> </refsect1> |