summaryrefslogtreecommitdiff
path: root/src/shared/seccomp-util.h
Commit message (Expand)AuthorAgeFilesLines
* seccomp: add scmp_act_kill_process() helper that returns SCMP_ACT_KILL_PROCES...Lennart Poettering2019-05-241-0/+2
* seccomp: check more error codes from seccomp_load()Anita Zhang2019-04-121-0/+6
* pid1: pass unit name to seccomp parser when we have no file locationZbigniew Jędrzejewski-Szmek2019-04-031-7/+7
* seccomp: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid...Lennart Poettering2019-04-021-0/+1
* core: ProtectHostname= featureTopi Miettinen2019-02-201-0/+1
* seccomp: reduce logging about failure to add syscall to seccompZbigniew Jędrzejewski-Szmek2018-09-241-3/+3
* seccomp: add new system call filter, suitable as default whitelist for system...Lennart Poettering2018-06-141-0/+1
* tree-wide: remove Lennart's copyright linesLennart Poettering2018-06-141-4/+0
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* tree-wide: unify how we define bit mak enumsLennart Poettering2018-06-121-4/+4
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* seccomp: rework functions for parsing system call filtersLennart Poettering2018-02-271-16/+13
* core,seccomp: fix logic to parse syscall filter in dbus-execute.cYu Watanabe2017-12-231-0/+18
* Add SPDX license identifiers to source files under the LGPLZbigniew Jędrzejewski-Szmek2017-11-191-0/+1
* core: add support to specify errno in SystemCallFilter=Yu Watanabe2017-11-111-2/+2
* seccomp: add three more seccomp groupsLennart Poettering2017-10-051-0/+3
* seccomp: remove '@credentials' syscall set (#6958)Djalal Harouni2017-10-031-1/+0
* seccomp: add four new syscall groupsLennart Poettering2017-09-141-0/+4
* nspawn: implement configurable syscall whitelisting/blacklistingLennart Poettering2017-09-121-1/+1
* seccomp: split out inner loop code of seccomp_add_syscall_filter_set()Lennart Poettering2017-09-111-0/+2
* seccomp: LockPersonality boolean (#6193)Topi Miettinen2017-08-291-0/+1
* core: add two new special ExecStart= character prefixesLennart Poettering2017-08-101-0/+2
* seccomp: add new @setuid seccomp groupLennart Poettering2017-08-101-0/+1
* seccomp-util: add parse_syscall_archs()Yu Watanabe2017-08-071-0/+2
* seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...Zbigniew Jędrzejewski-Szmek2017-05-101-8/+0
* seccomp: assume clone() arg order is known on all architecturesZbigniew Jędrzejewski-Szmek2017-05-071-7/+0
* seccomp: drop SECCOMP_MEMORY_DENY_WRITE_EXECUTE_BROKEN, add test for shmatZbigniew Jędrzejewski-Szmek2017-05-071-7/+0
* seccomp: add clone syscall definitions for mips (#5880)James Cowgill2017-05-031-1/+1
* Define clone order on ppc (#5325)Zbigniew Jędrzejewski-Szmek2017-02-141-1/+1
* seccomp: on s390 the clone() parameters are reversedLennart Poettering2017-02-081-0/+7
* seccomp: MemoryDenyWriteExecute= should affect both mmap() and mmap2() (#5254)Lennart Poettering2017-02-081-0/+7
* seccomp: RestrictAddressFamilies= is not supported on i386/s390/s390x, make i...Lennart Poettering2017-02-061-0/+8
* seccomp: rework seccomp code, to improve compat with some archsLennart Poettering2017-01-171-6/+19
* seccomp: add two new filter sets: @reboot and @swapLennart Poettering2016-12-271-0/+2
* seccomp: add @filesystem syscall group (#4537)Lennart Poettering2016-11-211-0/+1
* core: add new RestrictNamespaces= unit file settingLennart Poettering2016-11-041-0/+2
* seccomp-util, analyze: export comments as a help stringZbigniew Jędrzejewski-Szmek2016-11-031-0/+1
* seccomp-util: move @default to the first positionZbigniew Jędrzejewski-Szmek2016-11-031-1/+2
* seccomp: add two new syscall groupsLennart Poettering2016-11-021-0/+2
* seccomp: add test-seccomp test toolLennart Poettering2016-10-241-0/+1
* seccomp: add new helper call seccomp_load_filter_set()Lennart Poettering2016-10-241-0/+2
* seccomp: add new seccomp_init_conservative() helperLennart Poettering2016-10-241-1/+3
* core: rework syscall filter set handlingLennart Poettering2016-10-241-5/+27
* core: do not fail at step SECCOMP if there is no kernel support (#4004)Felipe Sateler2016-08-221-0/+2
* core: add pre-defined syscall groups to SystemCallFilter= (#3053) (#3157)Topi Miettinen2016-06-011-0/+7
* tree-wide: remove Emacs lines from all filesDaniel Mack2016-02-101-2/+0
* shared: include what we useThomas Hindoe Paaboel Andersen2015-12-061-0/+1
* seccomp-util.h: make sure seccomp-util.h can be included aloneLennart Poettering2014-12-121-0/+1
* seccomp: add helper call to add all secondary archs to a seccomp filterLennart Poettering2014-02-181-0/+2
* core: add SystemCallArchitectures= unit setting to allow disabling of non-nativeLennart Poettering2014-02-131-0/+26