summaryrefslogtreecommitdiffstats
path: root/src/shared/seccomp-util.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* seccomp-util: split out seccomp_filter_set_add_by_name()Yu Watanabe2024-06-241-0/+1
* various: move const ptr indicator to return valueZbigniew Jędrzejewski-Szmek2024-06-191-1/+1
* seccomp: move seccomp_parse_errno_or_action() into common definitionsLennart Poettering2023-08-211-13/+15
* nspawn,shared: make ERRNO_IS_SECCOMP_FATAL an inline func with _NEG_ variantZbigniew Jędrzejewski-Szmek2023-08-161-2/+9
* seccomp-util: enforce group orderingLennart Poettering2023-03-241-1/+4
* seccomp-util: add new @sandbox syscall group with landlock/seccompLennart Poettering2023-03-241-0/+1
* test-seccomp: support systems that sched_setscheduler() is already limitedYu Watanabe2022-09-151-1/+4
* build: fix build without seccompDominique Martinet2021-11-251-0/+10
* nspawn: add --suppress-sync=yes mode for turning sync() and friends into NOPs...Lennart Poettering2021-10-201-0/+2
* tree-wide: reset the cleaned-up variable in cleanup functionsZbigniew Jędrzejewski-Szmek2021-02-161-1/+1
* util: move parse_syscall_and_errno() to seccomp-util.cYu Watanabe2021-01-181-0/+2
* seccomp: don't install filters for archs that can't use syscallsGreg Depoire--Ferrer2020-12-101-3/+11
* license: LGPL-2.1+ -> LGPL-2.1-or-laterYu Watanabe2020-11-091-1/+1
* exec: Add kill action to system call filtersTopi Miettinen2020-09-151-0/+25
* shared/seccomp-util: added functionality to make list of filtred syscallsZbigniew Jędrzejewski-Szmek2020-08-241-1/+7
* shared: add @known syscall listZbigniew Jędrzejewski-Szmek2020-08-241-1/+2
* tree-wide: avoid some loaded termsLennart Poettering2020-06-251-2/+2
* tree-wide: use set_ensure_put()Zbigniew Jędrzejewski-Szmek2020-06-221-1/+1
* shared: Add ProtectKernelLogs propertyKevin Kuehler2019-11-111-0/+1
* Add @pkey syscall groupZbigniew Jędrzejewski-Szmek2019-11-081-0/+1
* seccomp: add scmp_act_kill_process() helper that returns SCMP_ACT_KILL_PROCES...Lennart Poettering2019-05-241-0/+2
* seccomp: check more error codes from seccomp_load()Anita Zhang2019-04-121-0/+6
* pid1: pass unit name to seccomp parser when we have no file locationZbigniew Jędrzejewski-Szmek2019-04-031-7/+7
* seccomp: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid...Lennart Poettering2019-04-021-0/+1
* core: ProtectHostname= featureTopi Miettinen2019-02-201-0/+1
* seccomp: reduce logging about failure to add syscall to seccompZbigniew Jędrzejewski-Szmek2018-09-241-3/+3
* seccomp: add new system call filter, suitable as default whitelist for system...Lennart Poettering2018-06-141-0/+1
* tree-wide: remove Lennart's copyright linesLennart Poettering2018-06-141-4/+0
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* tree-wide: unify how we define bit mak enumsLennart Poettering2018-06-121-4/+4
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* seccomp: rework functions for parsing system call filtersLennart Poettering2018-02-271-16/+13
* core,seccomp: fix logic to parse syscall filter in dbus-execute.cYu Watanabe2017-12-231-0/+18
* Add SPDX license identifiers to source files under the LGPLZbigniew Jędrzejewski-Szmek2017-11-191-0/+1
* core: add support to specify errno in SystemCallFilter=Yu Watanabe2017-11-111-2/+2
* seccomp: add three more seccomp groupsLennart Poettering2017-10-051-0/+3
* seccomp: remove '@credentials' syscall set (#6958)Djalal Harouni2017-10-031-1/+0
* seccomp: add four new syscall groupsLennart Poettering2017-09-141-0/+4
* nspawn: implement configurable syscall whitelisting/blacklistingLennart Poettering2017-09-121-1/+1
* seccomp: split out inner loop code of seccomp_add_syscall_filter_set()Lennart Poettering2017-09-111-0/+2
* seccomp: LockPersonality boolean (#6193)Topi Miettinen2017-08-291-0/+1
* core: add two new special ExecStart= character prefixesLennart Poettering2017-08-101-0/+2
* seccomp: add new @setuid seccomp groupLennart Poettering2017-08-101-0/+1
* seccomp-util: add parse_syscall_archs()Yu Watanabe2017-08-071-0/+2
* seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...Zbigniew Jędrzejewski-Szmek2017-05-101-8/+0
* seccomp: assume clone() arg order is known on all architecturesZbigniew Jędrzejewski-Szmek2017-05-081-7/+0
* seccomp: drop SECCOMP_MEMORY_DENY_WRITE_EXECUTE_BROKEN, add test for shmatZbigniew Jędrzejewski-Szmek2017-05-081-7/+0
* seccomp: add clone syscall definitions for mips (#5880)James Cowgill2017-05-031-1/+1
* Define clone order on ppc (#5325)Zbigniew Jędrzejewski-Szmek2017-02-141-1/+1
* seccomp: on s390 the clone() parameters are reversedLennart Poettering2017-02-081-0/+7