X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=src%2Fcore%2Fexecute.h;h=b2d70d7d86bb9c0ab53e3e5de026f9bf2b8a70a3;hp=989373f4818f20a9c40c364dccd5fdb32cee312e;hb=c0467cf387548dc98c0254f63553d862b35a84e5;hpb=09812eb764b440651f3ff4cb5d37bd343f800560 diff --git a/src/core/execute.h b/src/core/execute.h index 989373f48..b2d70d7d8 100644 --- a/src/core/execute.h +++ b/src/core/execute.h @@ -33,6 +33,11 @@ typedef struct ExecRuntime ExecRuntime; #include #include #include +#ifdef HAVE_SECCOMP +#include + +#include "set.h" +#endif #include "list.h" #include "util.h" @@ -133,6 +138,8 @@ struct ExecContext { char *utmp_id; + char *selinux_context; + char **read_write_dirs, **read_only_dirs, **inaccessible_dirs; unsigned long mount_flags; @@ -149,6 +156,7 @@ struct ExecContext { bool non_blocking; bool private_tmp; bool private_network; + bool private_devices; bool no_new_privileges; @@ -159,7 +167,12 @@ struct ExecContext { * don't enter a trigger loop. */ bool same_pgrp; - uint32_t *syscall_filter; +#ifdef HAVE_SECCOMP + scmp_filter_ctx syscall_filter; + Set *filtered_syscalls; + uint32_t syscall_filter_default_action; +#endif + char *syscall_filter_string; bool oom_score_adjust_set:1; bool nice_set:1;