index
:
delta/systemd.git
assert-cleanups-and-constification
baserock/adamcoldrick/yaml-morphology
baserock/jjardon/fix_parallel_build
baserock/jjardon/intltool
baserock/morph
baserock/paulsherwood/sd-update
baserock/pedroalvarez/v217
baserock/pedroalvarez/v218
baserock/ps/update-linux-v3.12-systemd-v208
baserock/radiofree/enable_xz
baserock/richardmaw/nspawn-path-escapes
baserock/richardmaw/wip-upgrade-root
baserock/v218-with-canonical-hostname-fix
baserock/v219-314-gd736e4f-network_fixes
baserock/v219-729-g163ab29-jetson_btrfs_fixes
cap-bpf-compat
chase-symlinks-rework
coverity
coverity-now-for-real
coverity-python
default_memory
dependabot/github_actions/actions/checkout-2.4.0
dependabot/github_actions/actions/upload-artifact-2.3.1
dependabot/github_actions/github/codeql-action-1.0.23
dependabot/github_actions/github/codeql-action-1.0.24
dependabot/github_actions/github/codeql-action-1.0.27
dependabot/github_actions/github/super-linter-4.8.2
dependabot/github_actions/github/super-linter-4.8.3
dependabot/github_actions/github/super-linter-4.8.4
dependabot/github_actions/systemd/mkosi-11
dependabot/pip/dot-github/workflows/meson-0.60.3
dev-no-noexec
enabled-optimization
gc-cleanup
gcc-hypothesis
hidden-units-are-good-units
hwdb
keszybz-patch-1
main
master
meson-allows-fuzzer-building
msekletar-security-list-process
oomd-and-user-slices
proot
readme-double-header
revert-10744-logind-lock-down
revert-11715-revert-11534-coverity2
revert-12181-install-etc-systemd-generator-dirs
revert-12463-issue-12452-netlink
revert-13201-networkctl-merge-table_add_cell
revert-13843-watchdog
revert-14900-fix-privatedevices-dev-mac-label
revert-15648-journalctl-cat-beefup
revert-16058-fix-memory-protection-default
revert-16460-turn-off-ubuntu-ppa
revert-1740-master
revert-18355-resolved-discover
revert-18515-temporarily-pin-arch-repos
revert-18807-noexec
revert-19146-fix-JOURNAL-doc
revert-20598-order_noauto
revert-20998-dev/hv-detect
revert-2818-master
revert-2843-clock_boottime
revert-2859-ldconfig-after-localfs
revert-3283-master
revert-3528-upstream-add-networkd-dbus
revert-5012-master
revert-5298-relocatable-tests
revert-6508-audit-socket
setup-semaphore
stat2
systemctl-list-dependencies
systemd-paypal-funding
tasks-max-dynamic
v216-stable
what-s-up-with-coverity
wip/hadess/add-move-udev-action
wip/hadess/chassis-override
wip/hadess/hp-accel-quirk
wip/hadess/lis3lv02d-rule-hp
wip/hadess/logitech-hidraw
wip/hadess/logitech-ultrathin-touch-mouse
wip/hadess/memory-id
wip/hadess/minipro-uaccess
wip/hadess/rfkill-uaccess
wip/hadess/unsupported-dmi
wip/hadess/usb-analysers-uaccess
wip/hadess/webcams
github.com: systemd/systemd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
shared
/
seccomp-util.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
seccomp: do not ignore deny-listed syscalls with errno when list is allow-list
Yu Watanabe
2021-03-08
1
-4
/
+6
*
seccomp: use FLAGS_SET() macro
Yu Watanabe
2021-03-08
1
-5
/
+5
*
core,seccomp: refuse to specify errno for allow-listed syscalls
Yu Watanabe
2021-03-08
1
-0
/
+3
*
seccomp: fix comment and change variable name
Yu Watanabe
2021-03-08
1
-7
/
+9
*
seccomp_restrict_sxid: return ENOSYS for openat2()
Mike Gilbert
2021-01-27
1
-2
/
+4
*
util: move parse_syscall_and_errno() to seccomp-util.c
Yu Watanabe
2021-01-19
1
-0
/
+38
*
seccomp: don't install filters for archs that can't use syscalls
Greg Depoire--Ferrer
2020-12-10
1
-17
/
+30
*
shared/seccomp-util: address family filtering is broken on ppc
Zbigniew Jędrzejewski-Szmek
2020-11-26
1
-3
/
+3
*
seccomp: also move munmap into @default syscall filter set
Yu Watanabe
2020-11-24
1
-1
/
+1
*
seccomp: move brk+mmap+mmap2 into @default syscall filter set
Lennart Poettering
2020-11-19
1
-3
/
+3
*
license: LGPL-2.1+ -> LGPL-2.1-or-later
Yu Watanabe
2020-11-09
1
-1
/
+1
*
seccomp: allow turning off of seccomp filtering via env var
Lennart Poettering
2020-11-05
1
-4
/
+14
*
shared/seccomp-util: move stime() to @obsolete
Topi Miettinen
2020-11-04
1
-1
/
+1
*
seccomp: allowlist close_range() by default in @basic-io
Lennart Poettering
2020-10-14
1
-0
/
+1
*
tree-wide: assorted coccinelle fixes
Frantisek Sumsal
2020-10-09
1
-2
/
+2
*
seccomp-util: fix typo in help message
Samanta Navarro
2020-10-03
1
-1
/
+1
*
seccomp-util: add cacheflush() syscall to @default syscall set
Lennart Poettering
2020-09-30
1
-0
/
+1
*
exec: SystemCallLog= directive
Topi Miettinen
2020-09-15
1
-0
/
+4
*
exec: Add kill action to system call filters
Topi Miettinen
2020-09-15
1
-1
/
+3
*
tree-wide: define iterator inside of the macro
Zbigniew Jędrzejewski-Szmek
2020-09-08
1
-7
/
+4
*
tree-wide: drop pointless zero initialization (#16900)
fangxiuning
2020-08-30
1
-1
/
+1
*
Merge pull request #16819 from keszybz/seccomp-enosys
Zbigniew Jędrzejewski-Szmek
2020-08-25
1
-16
/
+43
|
\
|
*
shared/seccomp-util: added functionality to make list of filtred syscalls
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-7
/
+32
|
*
shared/seccomp: reduce scope of indexing variables
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-9
/
+5
|
*
shared: add @known syscall list
Zbigniew Jędrzejewski-Szmek
2020-08-24
1
-0
/
+6
*
|
Request seccomp logging if SYSTEMD_LOG_SECCOMP environment variable is set.
Steve Dodd
2020-08-21
1
-0
/
+9
*
|
seccomp: add support for riscv64
Aurelien Jarno
2020-08-21
1
-4
/
+26
|
/
*
shared/seccomp: use _cleanup_ in one more place
Zbigniew Jędrzejewski-Szmek
2020-08-19
1
-10
/
+6
*
shared/seccomp: do not use ifdef guards around textual syscall names
Zbigniew Jędrzejewski-Szmek
2020-08-19
1
-6
/
+2
*
Newer Glibc use faccessat2 to implement faccessat
Michael Scherer
2020-08-16
1
-0
/
+1
*
tree-wide: avoid some loaded terms
Lennart Poettering
2020-06-25
1
-14
/
+13
*
tree-wide: use set_ensure_put()
Zbigniew Jędrzejewski-Szmek
2020-06-22
1
-10
/
+5
*
seccomp: filter openat2() entirely in seccomp_restrict_sxid()
Lennart Poettering
2020-06-03
1
-0
/
+16
*
tree-wide: Initialize _cleanup_ variables if needed
Benjamin Robin
2020-05-13
1
-1
/
+1
*
seccomp-util: add new syscalls from kernel 5.6 to syscall filter table
Lennart Poettering
2020-05-11
1
-0
/
+2
*
shared/seccomp: avoid possibly writing bogus errno code in debug log
Zbigniew Jędrzejewski-Szmek
2019-12-06
1
-5
/
+5
*
seccomp: use per arch shmat_syscall
Christian Ehrhardt
2019-12-05
1
-1
/
+1
*
seccomp: ensure rules are loaded in seccomp_memory_deny_write_execute
Christian Ehrhardt
2019-12-05
1
-1
/
+6
*
seccomp: fix multiplexed system calls
Christian Ehrhardt
2019-12-05
1
-8
/
+8
*
shared: Add ProtectKernelLogs property
Kevin Kuehler
2019-11-11
1
-0
/
+32
*
Add @pkey syscall group
Zbigniew Jędrzejewski-Szmek
2019-11-08
1
-0
/
+8
*
seccomp: add all *time64 syscalls
Zbigniew Jędrzejewski-Szmek
2019-11-08
1
-0
/
+20
*
seccomp: add new Linux 5.3 syscalls to syscall filter lists
Lennart Poettering
2019-10-30
1
-0
/
+12
*
shared/seccomp: add sync_file_range2
Zbigniew Jędrzejewski-Szmek
2019-08-19
1
-0
/
+1
*
src/shared/seccomp-util.c: Add mmap definitions for s390
Dan Streetman
2019-08-13
1
-2
/
+4
*
seccomp: add new 5.1 syscall pidfd_send_signal() to filter set list
Lennart Poettering
2019-05-28
1
-0
/
+1
*
seccomp: add scmp_act_kill_process() helper that returns SCMP_ACT_KILL_PROCES...
Lennart Poettering
2019-05-24
1
-0
/
+15
*
seccomp: check more error codes from seccomp_load()
Anita Zhang
2019-04-12
1
-11
/
+11
*
Merge pull request #12198 from keszybz/seccomp-parsing-logging
Zbigniew Jędrzejewski-Szmek
2019-04-03
1
-2
/
+2
|
\
|
*
pid1: pass unit name to seccomp parser when we have no file location
Zbigniew Jędrzejewski-Szmek
2019-04-03
1
-2
/
+2
[next]