index
:
delta/docker.git
0.10
0.10.1-hotfixes
1.12.x
1.13.0-rc4-cherrypicks
1.13.x
17.03.x
17.04.x
17.05.x
19.03
20.10
22.06
23.0
24.0
6969-reponame-rest-api
b2d-install-rewrite
baserock/v1.0.1
baserock/v1.1.2
bump_v1.10.1
bump_v1.10.2
bump_v1.10.3
bump_v1.11.0
bump_v1.11.1
bump_v1.12.0
bump_v1.12.1
change_email
changelog-1.12.2
cherry-picks-1.12.2
cpuguy-test-sync
doc0.8.1
docs
docs-1.0
docs-1.1
docs-1.3.3
docs-1.4
docs-for-new-commands
fix-ben-redirect
fix-makefile-update-external
fix_registry_pushes
hotfix-0.9.2
icecrime-patch-1
jenkins-test-1
jenkins-test-2
jjh/ioctl-vhd
libn-bump
linkchecker-updates
market_release
master
merge_release_v1.2.0
moby
move-to-markdown
move_git_clone_client_side
moxiegirl-patch-1
moxiegirl-patch-README
name_label
nl
p2p_transfer
patch-bad-formatting
post-1.2.0-docs-update-1
post-1.2.0-docs_update-2
priv-repos
publish-compose-docs
real-master
release
release-0.10
release-0.9
release-1.3
release_v1.8.0
revert-11495-m3
revert-11572-skip-hello-world-test
revert-12383-patch-1
revert-12882-12824-uninstall-docs
revert-16228-ContextualizeEvents
revert-16556-10662-randomunix
revert-20566-20371-validate-hostname
revert-39415-master
shykes-new-docs-maintainers
stevvooe-patch-1
swarm
swarm-backend
swarm-cli
swarm-stack
typofix
v1.6.0
v1.8.2
github.com: dotcloud/docker.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
profiles
Commit message (
Expand
)
Author
Age
Files
Lines
*
profiles/apparmor: remove version-conditional constraints (< 2.8.96)
Sebastiaan van Stijn
2023-02-08
1
-4
/
+0
*
seccomp: block socket calls to AF_VSOCK in default profile
Sebastiaan van Stijn
2022-12-01
2
-2
/
+26
*
seccomp: allow "bpf", "perf_event_open", gated by CAP_BPF, CAP_PERFMON
Sebastiaan van Stijn
2022-08-18
2
-0
/
+44
*
profiles: seccomp: add syscalls related to PKU in default policy
zhubojun
2022-07-11
2
-0
/
+6
*
profiles: seccomp: allow clock_settime64 when CAP_SYS_TIME is added
Bastien Pascard
2022-07-06
2
-1
/
+3
*
Fix AppArmor profile docker-default /proc/sys rule
Phil Sphicas
2022-06-30
1
-1
/
+1
*
all: use unix.ByteSliceToString for utsname fields
Kir Kolyshkin
2022-05-18
1
-2
/
+1
*
Allow different syscalls from kernels 5.12 -> 5.16
Djordje Lukic
2022-05-13
2
-0
/
+10
*
Merge pull request #43553 from AkihiroSuda/riscv64
Justin Cormack
2022-05-13
2
-0
/
+30
|
\
|
*
seccomp: support riscv64
Akihiro Suda
2022-05-02
2
-0
/
+30
*
|
Merge pull request #43199 from Xyene/allow-landlock
Sebastiaan van Stijn
2022-05-13
2
-0
/
+6
|
\
\
|
*
|
seccomp: add support for Landlock syscalls in default policy
Tudor Brindus
2022-01-31
2
-0
/
+6
|
|
/
*
|
Remove "seccomp" build tag
Tianon Gravi
2022-05-12
2
-12
/
+0
|
/
*
seccomp: add support for "swapcontext" syscall in default policy
Sören Tempel
2021-12-18
2
-1
/
+3
*
refactor: move from io/ioutil to io and os package
Eng Zer Jun
2021-08-27
3
-11
/
+9
*
Update to Go 1.17.0, and gofmt with Go 1.17
Sebastiaan van Stijn
2021-08-24
6
-0
/
+6
*
Merge pull request #42649 from kinvolk/rata/seccomp-default-errno
Sebastiaan van Stijn
2021-08-03
4
-2
/
+8
|
\
|
*
seccomp: Use explicit DefaultErrnoRet
Rodrigo Campos
2021-07-30
4
-2
/
+8
*
|
seccomp: add support for "clone3" syscall in default policy
Daniel P. Berrangé
2021-07-27
2
-0
/
+27
|
/
*
seccomp: Seccomp: embed oci-spec LinuxSeccomp, add support for seccomp flags
Sebastiaan van Stijn
2021-07-17
4
-22
/
+32
*
seccomp: setupSeccomp(): update errors and remove redundant check
Sebastiaan van Stijn
2021-07-17
1
-13
/
+9
*
seccomp: add additional unit-tests
Sebastiaan van Stijn
2021-07-16
1
-2
/
+38
*
seccomp: use oci-spec consts in tests
Sebastiaan van Stijn
2021-07-16
1
-8
/
+8
*
seccomp: improve GoDoc for Seccomp fields
Sebastiaan van Stijn
2021-07-16
1
-3
/
+13
*
seccomp: Sync fields with runtime-spec fields
Rodrigo Campos
2021-07-08
3
-1
/
+49
*
profiles/seccomp.Syscall: use pointers and omitempty
Sebastiaan van Stijn
2021-06-17
4
-132
/
+80
*
seccomp.Syscall: embed runtime-spec Syscall type
Sebastiaan van Stijn
2021-06-17
6
-563
/
+609
*
Enable `process_vm_readv` and `process_vm_writev` for kernel > 4.8
clubby789
2021-03-04
2
-1
/
+7
*
profiles: seccomp: update to Linux 5.11 syscall list
Aleksa Sarai
2021-01-27
2
-0
/
+18
*
seccomp: Add pidfd_getfd syscall
Mark Vainomaa
2020-11-12
2
-0
/
+2
*
seccomp: Add pidfd_open and pidfd_send_signal
Mark Vainomaa
2020-11-11
2
-0
/
+4
*
seccomp: implement marshal/unmarshall for MinVersion
Sebastiaan van Stijn
2020-10-07
6
-45
/
+145
*
seccomp: add test for unmarshal default profile
Sebastiaan van Stijn
2020-10-02
1
-0
/
+23
*
seccomp: remove dependency on pkg/parsers/kernel
Sebastiaan van Stijn
2020-10-02
4
-20
/
+200
*
seccomp: remove dependency on oci package
Sebastiaan van Stijn
2020-09-29
2
-4
/
+75
*
seccomp: add test for loading old JSON format
Sebastiaan van Stijn
2020-09-28
2
-0
/
+1606
*
seccomp: replace types with runtime-spec types
Sebastiaan van Stijn
2020-09-18
4
-182
/
+109
*
seccomp: move seccomp types from api into seccomp profile
Sebastiaan van Stijn
2020-09-18
4
-124
/
+212
*
Merge pull request #41395 from cpuguy83/no_libseccomp
Sebastiaan van Stijn
2020-09-15
2
-21
/
+39
|
\
|
*
Remove dependency in dockerd on libseccomp
Brian Goff
2020-09-11
2
-21
/
+39
*
|
Merge pull request #41337 from cyphar/apparmor-update-profile
Justin Cormack
2020-09-11
1
-2
/
+10
|
\
\
|
|
/
|
/
|
|
*
apparmor: permit signals from unconfined programs
Aleksa Sarai
2020-08-11
1
-2
/
+10
*
|
Add faccessat2 to default seccomp profile.
Jintao Zhang
2020-08-17
2
-0
/
+2
*
|
Add openat2 to default seccomp profile.
Jintao Zhang
2020-08-16
2
-0
/
+2
|
/
*
Replace uses of blacklist/whitelist
Sebastiaan van Stijn
2020-07-14
1
-1
/
+1
*
seccomp: allow 'rseq' syscall in default seccomp profile
Florian Schmaus
2020-06-26
2
-0
/
+2
*
Merge pull request #40995 from KentaTada/remove-unused-syscall
Justin Cormack
2020-05-28
2
-3
/
+1
|
\
|
*
seccomp: remove the unused query_module(2)
Kenta Tada
2020-05-19
2
-3
/
+1
*
|
Merge pull request #40731 from sqreen/fix/seccomp-profile
Akihiro Suda
2020-05-20
2
-0
/
+2
|
\
\
|
|
/
|
/
|
|
*
seccomp: allow syscall membarrier
Julio Guerra
2020-04-07
2
-0
/
+2
[next]