summaryrefslogtreecommitdiffstats
path: root/src/shared/seccomp-util.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* seccomp: remove 'gettid' syscall from '@process' syscall set (#6989)Djalal Harouni2017-10-051-1/+0
* seccomp: ignore (and debug log) errors by all invocations of seccomp_rule_add...Lennart Poettering2017-10-051-2/+4
* seccomp: always handle seccomp_load() failing the same wayLennart Poettering2017-10-051-3/+7
* seccomp: react gracefully if we can't translate a syscall nameLennart Poettering2017-10-051-5/+6
* seccomp: include prlimit64 and ugetrlimit in @defaultLennart Poettering2017-10-051-1/+2
* seccomp: add sched_yield syscall to the @default syscall setDjalal Harouni2017-10-041-0/+1
* seccomp: remove '@credentials' syscall set (#6958)Djalal Harouni2017-10-031-28/+21
* seccomp: improve debug loggingLennart Poettering2017-09-141-2/+6
* seccomp: add four new syscall groupsLennart Poettering2017-09-141-0/+71
* seccomp: augment the @resources group a bitLennart Poettering2017-09-141-7/+9
* seccomp: beef up @process group a bitLennart Poettering2017-09-141-0/+10
* seccomp: "idle" is another obsolete syscallLennart Poettering2017-09-141-0/+1
* seccomp: order the syscalls in more groups alphabeticallyLennart Poettering2017-09-141-21/+21
* seccomp: let's update @file-system a bitLennart Poettering2017-09-141-10/+19
* seccomp: let's update base-io a bitLennart Poettering2017-09-141-1/+2
* seccomp: update "@default" seccomp group a bitLennart Poettering2017-09-141-0/+8
* nspawn: implement configurable syscall whitelisting/blacklistingLennart Poettering2017-09-121-6/+10
* seccomp: split out inner loop code of seccomp_add_syscall_filter_set()Lennart Poettering2017-09-111-22/+37
* seccomp: drop default_action parameter from seccomp_add_syscall_filter_set()Lennart Poettering2017-09-111-3/+2
* shared: add statx(2) to @file-system syscall filter list (#6738)Lennart Poettering2017-09-041-0/+1
* seccomp: rework seccomp_lock_personality() to apply filter to all archsLennart Poettering2017-08-291-11/+26
* seccomp: LockPersonality boolean (#6193)Topi Miettinen2017-08-291-0/+19
* core: add two new special ExecStart= character prefixesLennart Poettering2017-08-101-0/+38
* seccomp: add new @setuid seccomp groupLennart Poettering2017-08-101-0/+19
* seccomp-util: add parse_syscall_archs()Yu Watanabe2017-08-071-0/+32
* seccomp: arm64 does not have mmap2Zbigniew Jędrzejewski-Szmek2017-07-151-5/+2
* seccomp: arm64/x32 do not have _sysctlZbigniew Jędrzejewski-Szmek2017-07-151-0/+4
* shared/seccomp-util: add parentheses and no. after syscall nameZbigniew Jędrzejewski-Szmek2017-07-151-2/+2
* seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...Zbigniew Jędrzejewski-Szmek2017-05-101-3/+3
* seccomp: assume clone() arg order is known on all architecturesZbigniew Jędrzejewski-Szmek2017-05-081-34/+2
* seccomp: add mmap/shmat defines for arm and arm64Zbigniew Jędrzejewski-Szmek2017-05-081-3/+12
* seccomp: add mmap/shmat defines for ppc64Zbigniew Jędrzejewski-Szmek2017-05-081-4/+20
* seccomp: factor out seccomp_rule_add_exact to a helper functionZbigniew Jędrzejewski-Szmek2017-05-081-48/+36
* seccomp: add clone syscall definitions for mips (#5880)James Cowgill2017-05-031-0/+6
* Define clone order on ppc (#5325)Zbigniew Jędrzejewski-Szmek2017-02-141-2/+4
* seccomp: disable RestrictAddressFamilies= for the ABI we shall block, not the...Lennart Poettering2017-02-121-3/+27
* seccomp: order seccomp ABI list, so that our native ABI comes last (#5306)Lennart Poettering2017-02-101-13/+54
* seccomp: add forgotten munmap() syscall to @file-system (#5291)Lennart Poettering2017-02-101-0/+1
* seccomp: on s390 the clone() parameters are reversedLennart Poettering2017-02-081-6/+39
* seccomp: MemoryDenyWriteExecute= should affect both mmap() and mmap2() (#5254)Lennart Poettering2017-02-081-18/+74
* seccomp: RestrictAddressFamilies= is not supported on i386/s390/s390x, make i...Lennart Poettering2017-02-061-0/+3
* seccomp: don't ever try to add an ABI before removing the default native ABI ...Evgeny Vereshchagin2017-02-051-2/+2
* seccomp: minor simplifications for is_seccomp_available()Lennart Poettering2017-01-181-7/+8
* seccomp: rework seccomp code, to improve compat with some archsLennart Poettering2017-01-181-121/+531
* seccomp: move bdflush() system call to @obsolete filter groupLennart Poettering2016-12-271-1/+1
* seccomp: add proper help string for @resources seccomp filter setLennart Poettering2016-12-271-1/+1
* seccomp: add two new filter sets: @reboot and @swapLennart Poettering2016-12-271-0/+15
* seccomp: add @filesystem syscall group (#4537)Lennart Poettering2016-11-221-0/+72
* core: add new RestrictNamespaces= unit file settingLennart Poettering2016-11-041-0/+89
* seccomp-util, analyze: export comments as a help stringZbigniew Jędrzejewski-Szmek2016-11-031-16/+18