index
:
systemd
main
systemd
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
nspawn
/
nspawn-seccomp.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
core: turn on higher optimization level in seccomp
Zbigniew Jędrzejewski-Szmek
2023-12-02
1
-1
/
+1
*
tree-wide: don't ifdef seccomp-util.h, drop seccomp.h inclusion everywhere
Lennart Poettering
2023-08-21
1
-6
/
+0
*
nspawn,shared: make ERRNO_IS_SECCOMP_FATAL an inline func with _NEG_ variant
Zbigniew Jędrzejewski-Szmek
2023-08-16
1
-10
/
+10
*
nspawn,shared: cleanup use of ERRNO_IS_SECCOMP_FATAL()
Dmitry V. Levin
2023-07-28
1
-6
/
+8
*
nspawn: realign columns
Zbigniew Jędrzejewski-Szmek
2022-12-13
1
-79
/
+79
*
nspawn: allow sched_rr_get_interval_time64 through seccomp filter
Sam James
2022-11-18
1
-0
/
+1
*
strv: make iterator in STRV_FOREACH() declaread in the loop
Yu Watanabe
2022-03-19
1
-1
/
+0
*
nspawn: remove outdated comment regarding bpffs
Ilya Dmitrichenko
2020-12-14
1
-1
/
+1
*
license: LGPL-2.1+ -> LGPL-2.1-or-later
Yu Watanabe
2020-11-09
1
-1
/
+1
*
seccomp: allow turning off of seccomp filtering via env var
Lennart Poettering
2020-11-05
1
-1
/
+1
*
nspawn: turn on higher optimization level in seccomp
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-0
/
+7
*
nspawn: return ENOSYS by default, EPERM for "known" calls
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-5
/
+15
*
shared/seccomp-util: added functionality to make list of filtred syscalls
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-2
/
+7
*
tree-wide: avoid some loaded terms
Lennart Poettering
2020-06-25
1
-13
/
+13
*
nspawn: log syscalls we cannot add at debug level
Zbigniew Jędrzejewski-Szmek
2019-11-22
1
-4
/
+3
*
Add @pkey syscall group
Zbigniew Jędrzejewski-Szmek
2019-11-08
1
-3
/
+1
*
seccomp: check more error codes from seccomp_load()
Anita Zhang
2019-04-12
1
-2
/
+2
*
headers: remove unneeded includes from util.h
Zbigniew Jędrzejewski-Szmek
2019-03-27
1
-0
/
+1
*
seccomp: tighten checking of seccomp filter creation
Zbigniew Jędrzejewski-Szmek
2018-09-24
1
-9
/
+5
*
seccomp: reduce logging about failure to add syscall to seccomp
Zbigniew Jędrzejewski-Szmek
2018-09-24
1
-2
/
+2
*
tree-wide: remove Lennart's copyright lines
Lennart Poettering
2018-06-14
1
-3
/
+0
*
tree-wide: drop 'This file is part of systemd' blurb
Lennart Poettering
2018-06-14
1
-2
/
+0
*
tree-wide: drop license boilerplate
Zbigniew Jędrzejewski-Szmek
2018-04-06
1
-13
/
+0
*
Add SPDX license identifiers to source files under the LGPL
Zbigniew Jędrzejewski-Szmek
2017-11-19
1
-0
/
+1
*
seccomp: add three more seccomp groups
Lennart Poettering
2017-10-05
1
-20
/
+3
*
seccomp: include prlimit64 and ugetrlimit in @default
Lennart Poettering
2017-10-05
1
-1
/
+0
*
build-sys: use #if Y instead of #ifdef Y everywhere
Zbigniew Jędrzejewski-Szmek
2017-10-04
1
-3
/
+3
*
seccomp: remove '@credentials' syscall set (#6958)
Djalal Harouni
2017-10-03
1
-1
/
+1
*
nspawn: replace syscall blacklist by a whitelist
Lennart Poettering
2017-09-14
1
-37
/
+156
*
nspawn: implement configurable syscall whitelisting/blacklisting
Lennart Poettering
2017-09-12
1
-6
/
+18
*
nspawn: replace homegrown seccomp filter table largely with references to the...
Lennart Poettering
2017-09-11
1
-54
/
+6
*
nspawn: part over seccomp code to use seccomp_add_syscall_filter_item()
Lennart Poettering
2017-09-11
1
-67
/
+65
*
seccomp: rework seccomp code, to improve compat with some archs
Lennart Poettering
2017-01-18
1
-50
/
+63
*
seccomp: add new seccomp_init_conservative() helper
Lennart Poettering
2016-10-24
1
-15
/
+3
*
nspawn: detect SECCOMP availability, skip audit filter if unavailable
Felipe Sateler
2016-09-07
1
-5
/
+5
*
Use "return log_error_errno" in more places"
Zbigniew Jędrzejewski-Szmek
2016-07-23
1
-4
/
+2
*
nspawn: lock down system call filter a bit
Lennart Poettering
2016-06-13
1
-11
/
+67
*
nspawn: split out seccomp call into nspawn-seccomp.[ch]
Djalal Harouni
2016-05-26
1
-0
/
+143