summaryrefslogtreecommitdiff
path: root/src/nspawn/nspawn-seccomp.c
Commit message (Expand)AuthorAgeFilesLines
* headers: remove unneeded includes from util.hZbigniew Jędrzejewski-Szmek2019-03-271-0/+1
* seccomp: tighten checking of seccomp filter creationZbigniew Jędrzejewski-Szmek2018-09-241-9/+5
* seccomp: reduce logging about failure to add syscall to seccompZbigniew Jędrzejewski-Szmek2018-09-241-2/+2
* tree-wide: remove Lennart's copyright linesLennart Poettering2018-06-141-3/+0
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* Add SPDX license identifiers to source files under the LGPLZbigniew Jędrzejewski-Szmek2017-11-191-0/+1
* seccomp: add three more seccomp groupsLennart Poettering2017-10-051-20/+3
* seccomp: include prlimit64 and ugetrlimit in @defaultLennart Poettering2017-10-051-1/+0
* build-sys: use #if Y instead of #ifdef Y everywhereZbigniew Jędrzejewski-Szmek2017-10-041-3/+3
* seccomp: remove '@credentials' syscall set (#6958)Djalal Harouni2017-10-031-1/+1
* nspawn: replace syscall blacklist by a whitelistLennart Poettering2017-09-141-37/+156
* nspawn: implement configurable syscall whitelisting/blacklistingLennart Poettering2017-09-121-6/+18
* nspawn: replace homegrown seccomp filter table largely with references to the...Lennart Poettering2017-09-111-54/+6
* nspawn: part over seccomp code to use seccomp_add_syscall_filter_item()Lennart Poettering2017-09-111-67/+65
* seccomp: rework seccomp code, to improve compat with some archsLennart Poettering2017-01-171-50/+63
* seccomp: add new seccomp_init_conservative() helperLennart Poettering2016-10-241-15/+3
* nspawn: detect SECCOMP availability, skip audit filter if unavailableFelipe Sateler2016-09-061-5/+5
* Use "return log_error_errno" in more places"Zbigniew Jędrzejewski-Szmek2016-07-221-4/+2
* nspawn: lock down system call filter a bitLennart Poettering2016-06-131-11/+67
* nspawn: split out seccomp call into nspawn-seccomp.[ch]Djalal Harouni2016-05-261-0/+143