summaryrefslogtreecommitdiffstats
path: root/src/test/test-seccomp.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* shared/seccomp-util: address family filtering is broken on ppcZbigniew Jędrzejewski-Szmek2020-11-261-1/+1
* test: skip several tests in test-seccomp when running on asanYu Watanabe2020-11-251-0/+15
* test: skip several tests in test-seccomp when running on valgrindYu Watanabe2020-11-251-0/+30
* license: LGPL-2.1+ -> LGPL-2.1-or-laterYu Watanabe2020-11-091-1/+1
* test-seccomp: accept ENOSYS from sysctl(2) tooZbigniew Jędrzejewski-Szmek2020-09-241-1/+1
* Merge pull request #16819 from keszybz/seccomp-enosysZbigniew Jędrzejewski-Szmek2020-08-251-6/+11
|\
| * shared: add @known syscall listZbigniew Jędrzejewski-Szmek2020-08-241-6/+11
* | seccomp: add support for riscv64Aurelien Jarno2020-08-211-0/+3
|/
* test-seccomp: minor simpificationZbigniew Jędrzejewski-Szmek2020-08-051-5/+2
* tree-wide: avoid some loaded termsLennart Poettering2020-06-251-1/+1
* tests: various small fixes for strict systemsTopi Miettinen2020-04-261-0/+6
* make namespace_flags_to_string() not return empty stringYu Watanabe2020-03-031-1/+1
* seccomp: real syscall numbers are >= 0Mike Gilbert2019-12-091-10/+10
* seccomp: mmap test results depend on kernel/libseccomp/glibcChristian Ehrhardt2019-12-051-3/+4
* Merge pull request #13940 from keur/protect_kernel_logsLennart Poettering2019-11-151-0/+43
|\
| * test/test-seccomp: add test_protect_syslogKevin Kuehler2019-11-141-0/+43
* | seccomp: more comprehensive protection against libseccomp's __NR_xyz namespac...Lennart Poettering2019-11-151-9/+10
|/
* tree-wide: drop sched.h when missing_sched.h is includedYu Watanabe2019-11-031-1/+0
* tree-wide: drop missing.hYu Watanabe2019-10-311-1/+2
* test: use the new action in our testsLennart Poettering2019-05-241-1/+1
* test-seccomp: fix compilation on arm64Zbigniew Jędrzejewski-Szmek2019-04-031-1/+7
* test: add test case for restrict_suid_sgid()Lennart Poettering2019-04-021-0/+208
* seccomp: allow shmat to be a separate syscall on architectures which use a mu...Zbigniew Jędrzejewski-Szmek2019-03-151-3/+6
* seccomp: shm{get,at,dt} now have their own numbers everywhereZbigniew Jędrzejewski-Szmek2019-03-151-0/+9
* util: split out nulstr related stuff to nulstr-util.[ch]Lennart Poettering2019-03-141-0/+1
* util: split out memcmp()/memset() related calls into memory-util.[ch]Lennart Poettering2019-03-131-1/+1
* test: skip various tests if namespacing is not availableLennart Poettering2018-10-241-0/+5
* seccomp: reduce logging about failure to add syscall to seccompZbigniew Jędrzejewski-Szmek2018-09-241-8/+8
* test-seccomp: log function namesZbigniew Jędrzejewski-Szmek2018-09-241-1/+28
* test-seccomp: move two similar tests closerZbigniew Jędrzejewski-Szmek2018-09-241-31/+31
* test-seccomp: add log messages when skipping testsYu Watanabe2018-09-201-22/+68
* tests: use a helper function to parse environment and open loggingZbigniew Jędrzejewski-Szmek2018-09-141-1/+2
* seccomp: add new system call filter, suitable as default whitelist for system...Lennart Poettering2018-06-141-1/+2
* tree-wide: remove Lennart's copyright linesLennart Poettering2018-06-141-3/+0
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* nsflsgs: drop namespace_flag_{from,to}_string()Yu Watanabe2018-05-051-19/+26
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* process-util: rework wait_for_terminate_and_warn() to take a flags parameterLennart Poettering2018-01-041-10/+10
* Add SPDX license identifiers to source files under the LGPLZbigniew Jędrzejewski-Szmek2017-11-191-0/+1
* test: add tests for syscall:errno style in SystemCallFilter=Yu Watanabe2017-11-111-9/+42
* fix includesMatija Skala2017-10-301-1/+1
* tests: let's make sure the seccomp filter lists remain properly orderedLennart Poettering2017-09-141-0/+31
* util-lib: wrap personality() to fix up broken glibc error handling (#6766)Lennart Poettering2017-09-081-49/+18
* tests: check the return value of personality when errno is not set (#6752)Evgeny Vereshchagin2017-09-061-12/+26
* seccomp: rework seccomp_lock_personality() to apply filter to all archsLennart Poettering2017-08-291-1/+0
* seccomp: default to something resembling the current personality when locking itLennart Poettering2017-08-291-4/+34
* seccomp: LockPersonality boolean (#6193)Topi Miettinen2017-08-291-0/+36
* test-seccomp: arm64 does not have access() and poll()Zbigniew Jędrzejewski-Szmek2017-07-151-0/+8
* seccomp: arm64/x32 do not have _sysctlZbigniew Jędrzejewski-Szmek2017-07-151-0/+4
* seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...Zbigniew Jędrzejewski-Szmek2017-05-101-0/+9