index
:
systemd
main
systemd
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
src
/
shared
/
seccomp-util.h
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
seccomp-util: split out seccomp_filter_set_add_by_name()
Yu Watanabe
2024-06-24
1
-0
/
+1
*
various: move const ptr indicator to return value
Zbigniew Jędrzejewski-Szmek
2024-06-19
1
-1
/
+1
*
seccomp: move seccomp_parse_errno_or_action() into common definitions
Lennart Poettering
2023-08-21
1
-13
/
+15
*
nspawn,shared: make ERRNO_IS_SECCOMP_FATAL an inline func with _NEG_ variant
Zbigniew Jędrzejewski-Szmek
2023-08-16
1
-2
/
+9
*
seccomp-util: enforce group ordering
Lennart Poettering
2023-03-24
1
-1
/
+4
*
seccomp-util: add new @sandbox syscall group with landlock/seccomp
Lennart Poettering
2023-03-24
1
-0
/
+1
*
test-seccomp: support systems that sched_setscheduler() is already limited
Yu Watanabe
2022-09-15
1
-1
/
+4
*
build: fix build without seccomp
Dominique Martinet
2021-11-25
1
-0
/
+10
*
nspawn: add --suppress-sync=yes mode for turning sync() and friends into NOPs...
Lennart Poettering
2021-10-20
1
-0
/
+2
*
tree-wide: reset the cleaned-up variable in cleanup functions
Zbigniew Jędrzejewski-Szmek
2021-02-16
1
-1
/
+1
*
util: move parse_syscall_and_errno() to seccomp-util.c
Yu Watanabe
2021-01-18
1
-0
/
+2
*
seccomp: don't install filters for archs that can't use syscalls
Greg Depoire--Ferrer
2020-12-10
1
-3
/
+11
*
license: LGPL-2.1+ -> LGPL-2.1-or-later
Yu Watanabe
2020-11-09
1
-1
/
+1
*
exec: Add kill action to system call filters
Topi Miettinen
2020-09-15
1
-0
/
+25
*
shared/seccomp-util: added functionality to make list of filtred syscalls
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-1
/
+7
*
shared: add @known syscall list
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-1
/
+2
*
tree-wide: avoid some loaded terms
Lennart Poettering
2020-06-25
1
-2
/
+2
*
tree-wide: use set_ensure_put()
Zbigniew Jędrzejewski-Szmek
2020-06-22
1
-1
/
+1
*
shared: Add ProtectKernelLogs property
Kevin Kuehler
2019-11-11
1
-0
/
+1
*
Add @pkey syscall group
Zbigniew Jędrzejewski-Szmek
2019-11-08
1
-0
/
+1
*
seccomp: add scmp_act_kill_process() helper that returns SCMP_ACT_KILL_PROCES...
Lennart Poettering
2019-05-24
1
-0
/
+2
*
seccomp: check more error codes from seccomp_load()
Anita Zhang
2019-04-12
1
-0
/
+6
*
pid1: pass unit name to seccomp parser when we have no file location
Zbigniew Jędrzejewski-Szmek
2019-04-03
1
-7
/
+7
*
seccomp: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid...
Lennart Poettering
2019-04-02
1
-0
/
+1
*
core: ProtectHostname= feature
Topi Miettinen
2019-02-20
1
-0
/
+1
*
seccomp: reduce logging about failure to add syscall to seccomp
Zbigniew Jędrzejewski-Szmek
2018-09-24
1
-3
/
+3
*
seccomp: add new system call filter, suitable as default whitelist for system...
Lennart Poettering
2018-06-14
1
-0
/
+1
*
tree-wide: remove Lennart's copyright lines
Lennart Poettering
2018-06-14
1
-4
/
+0
*
tree-wide: drop 'This file is part of systemd' blurb
Lennart Poettering
2018-06-14
1
-2
/
+0
*
tree-wide: unify how we define bit mak enums
Lennart Poettering
2018-06-12
1
-4
/
+4
*
tree-wide: drop license boilerplate
Zbigniew Jędrzejewski-Szmek
2018-04-06
1
-13
/
+0
*
seccomp: rework functions for parsing system call filters
Lennart Poettering
2018-02-27
1
-16
/
+13
*
core,seccomp: fix logic to parse syscall filter in dbus-execute.c
Yu Watanabe
2017-12-23
1
-0
/
+18
*
Add SPDX license identifiers to source files under the LGPL
Zbigniew Jędrzejewski-Szmek
2017-11-19
1
-0
/
+1
*
core: add support to specify errno in SystemCallFilter=
Yu Watanabe
2017-11-11
1
-2
/
+2
*
seccomp: add three more seccomp groups
Lennart Poettering
2017-10-05
1
-0
/
+3
*
seccomp: remove '@credentials' syscall set (#6958)
Djalal Harouni
2017-10-03
1
-1
/
+0
*
seccomp: add four new syscall groups
Lennart Poettering
2017-09-14
1
-0
/
+4
*
nspawn: implement configurable syscall whitelisting/blacklisting
Lennart Poettering
2017-09-12
1
-1
/
+1
*
seccomp: split out inner loop code of seccomp_add_syscall_filter_set()
Lennart Poettering
2017-09-11
1
-0
/
+2
*
seccomp: LockPersonality boolean (#6193)
Topi Miettinen
2017-08-29
1
-0
/
+1
*
core: add two new special ExecStart= character prefixes
Lennart Poettering
2017-08-10
1
-0
/
+2
*
seccomp: add new @setuid seccomp group
Lennart Poettering
2017-08-10
1
-0
/
+1
*
seccomp-util: add parse_syscall_archs()
Yu Watanabe
2017-08-07
1
-0
/
+2
*
seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...
Zbigniew Jędrzejewski-Szmek
2017-05-10
1
-8
/
+0
*
seccomp: assume clone() arg order is known on all architectures
Zbigniew Jędrzejewski-Szmek
2017-05-08
1
-7
/
+0
*
seccomp: drop SECCOMP_MEMORY_DENY_WRITE_EXECUTE_BROKEN, add test for shmat
Zbigniew Jędrzejewski-Szmek
2017-05-08
1
-7
/
+0
*
seccomp: add clone syscall definitions for mips (#5880)
James Cowgill
2017-05-03
1
-1
/
+1
*
Define clone order on ppc (#5325)
Zbigniew Jędrzejewski-Szmek
2017-02-14
1
-1
/
+1
*
seccomp: on s390 the clone() parameters are reversed
Lennart Poettering
2017-02-08
1
-0
/
+7
[next]