summaryrefslogtreecommitdiff
path: root/src/shared/seccomp-util.c
Commit message (Expand)AuthorAgeFilesLines
...
* | seccomp: add support for riscv64Aurelien Jarno2020-08-211-4/+26
|/
* shared/seccomp: use _cleanup_ in one more placeZbigniew Jędrzejewski-Szmek2020-08-191-10/+6
* shared/seccomp: do not use ifdef guards around textual syscall namesZbigniew Jędrzejewski-Szmek2020-08-191-6/+2
* Newer Glibc use faccessat2 to implement faccessatMichael Scherer2020-08-161-0/+1
* tree-wide: avoid some loaded termsLennart Poettering2020-06-251-14/+13
* tree-wide: use set_ensure_put()Zbigniew Jędrzejewski-Szmek2020-06-221-10/+5
* seccomp: filter openat2() entirely in seccomp_restrict_sxid()Lennart Poettering2020-06-031-0/+16
* tree-wide: Initialize _cleanup_ variables if neededBenjamin Robin2020-05-131-1/+1
* seccomp-util: add new syscalls from kernel 5.6 to syscall filter tableLennart Poettering2020-05-111-0/+2
* shared/seccomp: avoid possibly writing bogus errno code in debug logZbigniew Jędrzejewski-Szmek2019-12-061-5/+5
* seccomp: use per arch shmat_syscallChristian Ehrhardt2019-12-051-1/+1
* seccomp: ensure rules are loaded in seccomp_memory_deny_write_executeChristian Ehrhardt2019-12-051-1/+6
* seccomp: fix multiplexed system callsChristian Ehrhardt2019-12-051-8/+8
* shared: Add ProtectKernelLogs propertyKevin Kuehler2019-11-111-0/+32
* Add @pkey syscall groupZbigniew Jędrzejewski-Szmek2019-11-081-0/+8
* seccomp: add all *time64 syscallsZbigniew Jędrzejewski-Szmek2019-11-081-0/+20
* seccomp: add new Linux 5.3 syscalls to syscall filter listsLennart Poettering2019-10-301-0/+12
* shared/seccomp: add sync_file_range2Zbigniew Jędrzejewski-Szmek2019-08-191-0/+1
* src/shared/seccomp-util.c: Add mmap definitions for s390Dan Streetman2019-08-131-2/+4
* seccomp: add new 5.1 syscall pidfd_send_signal() to filter set listLennart Poettering2019-05-281-0/+1
* seccomp: add scmp_act_kill_process() helper that returns SCMP_ACT_KILL_PROCES...Lennart Poettering2019-05-241-0/+15
* seccomp: check more error codes from seccomp_load()Anita Zhang2019-04-121-11/+11
* Merge pull request #12198 from keszybz/seccomp-parsing-loggingZbigniew Jędrzejewski-Szmek2019-04-031-2/+2
|\
| * pid1: pass unit name to seccomp parser when we have no file locationZbigniew Jędrzejewski-Szmek2019-04-031-2/+2
* | seccomp: rework how the S[UG]ID filter is installedZbigniew Jędrzejewski-Szmek2019-04-031-106/+138
|/
* seccomp: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid...Lennart Poettering2019-04-021-0/+132
* seccomp: add debug messages to seccomp_protect_hostname()Lennart Poettering2019-04-021-2/+6
* seccomp: add rseq() to default list of syscalls to whitelistLennart Poettering2019-03-281-0/+1
* seccomp: allow shmat to be a separate syscall on architectures which use a mu...Zbigniew Jędrzejewski-Szmek2019-03-151-1/+2
* seccomp: shm{get,at,dt} now have their own numbers everywhereZbigniew Jędrzejewski-Szmek2019-03-151-5/+0
* util: split out nulstr related stuff to nulstr-util.[ch]Lennart Poettering2019-03-141-2/+2
* core: ProtectHostname= featureTopi Miettinen2019-02-201-0/+37
* seccomp: drop mincore() from @system-service syscall filter groupLennart Poettering2019-01-161-1/+0
* seccomp-util: drop process_vm_readv from @debug groupLennart Poettering2018-11-301-2/+0
* coccinelle: make use of SYNTHETIC_ERRNOZbigniew Jędrzejewski-Szmek2018-11-221-4/+4
* seccomp: add some missing syscalls to filter setsLennart Poettering2018-11-161-0/+3
* shared: fix typoZbigniew Jędrzejewski-Szmek2018-11-101-1/+1
* tree-wide: replace 'unsigned int' with 'unsigned'Yu Watanabe2018-10-191-1/+1
* seccomp: tighten checking of seccomp filter creationZbigniew Jędrzejewski-Szmek2018-09-241-10/+16
* seccomp: reduce logging about failure to add syscall to seccompZbigniew Jędrzejewski-Szmek2018-09-241-26/+31
* seccomp: permit specifying multiple errnos for a syscallLucas Werkmeister2018-09-071-4/+2
* seccomp: improve error reportingLucas Werkmeister2018-08-291-1/+11
* seccomp: add swapcontext into @process for ppc32Lion Yang2018-07-031-0/+1
* seccomp: explain why we use setuid rather than @setuid in @privilegedLennart Poettering2018-06-141-1/+1
* seccomp: add new system call filter, suitable as default whitelist for system...Lennart Poettering2018-06-141-0/+69
* tree-wide: remove Lennart's copyright linesLennart Poettering2018-06-141-3/+0
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* nsflsgs: drop namespace_flag_{from,to}_string()Yu Watanabe2018-05-051-1/+1
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* tree-wide: use TAKE_PTR() and TAKE_FD() macrosYu Watanabe2018-04-051-2/+1