Skip to content
This repository has been archived by the owner on Nov 11, 2018. It is now read-only.

Block all syscalls that might permanently modify the system #16

Open
p-e-w opened this issue Feb 10, 2016 · 3 comments
Open

Block all syscalls that might permanently modify the system #16

p-e-w opened this issue Feb 10, 2016 · 3 comments
Milestone

Comments

@p-e-w
Copy link
Owner

p-e-w commented Feb 10, 2016

Among others:

  • utime, utimes
  • futimes, lutimes
  • utimensat, futimens
@p-e-w p-e-w added bug and removed enhancement labels Feb 19, 2016
@p-e-w p-e-w changed the title Block syscalls changing file timestamps Block all syscalls that might permanently modify the system Feb 28, 2016
@p-e-w p-e-w added enhancement and removed bug labels Feb 28, 2016
@p-e-w p-e-w added this to the v1.0 milestone Feb 28, 2016
@swapnilsm
Copy link

Have you started working on this?

@p-e-w
Copy link
Owner Author

p-e-w commented May 29, 2016

@swapnilsm: Not yet, I'm still searching for a reliable way to identify those syscalls among the hundreds that Linux has in total.

@swapnilsm
Copy link

Yeah and I couldn't find any good source where system calls have been tagged as read-only or not.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants