index
:
platform/upstream/systemd
accepted/tizen/generic
accepted/tizen/ivi
accepted/tizen/mobile
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m14.3_ivi
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_8.0_unified
accepted/tizen_9.0_unified
accepted/tizen_common
accepted/tizen_generic
accepted/tizen_ivi
accepted/tizen_ivi_panda
accepted/tizen_ivi_release
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_unified_dev
accepted/tizen_unified_riscv
accepted/tizen_unified_toolchain
accepted/tizen_unified_x
accepted/tizen_unified_x_asan
accepted/tizen_wearable
devel/ivi
kdbus-integration
ref/for/tizen
ref/for/tizen_3.0
sandbox/adrians/CVE-fix
sandbox/adrians/dirty-upgrade-to-232
sandbox/adrians/dirty-upgrade-to-233
sandbox/adrians/upgrade-to-234
sandbox/adrians/upgrade-to-235
sandbox/adrians/upgrade-to-236
sandbox/adrians/upgrade-to-237
sandbox/adrians/upgrade-to-238
sandbox/adrians/upgrade-to-239
sandbox/adrians/upgrade-to-240
sandbox/adrians/upgrade-to-241
sandbox/adrians/upgrade-to-242
sandbox/adrians/upgrade-to-243
sandbox/adrians/upgrade-to-244
sandbox/adrians/upgrade-to-245
sandbox/akazmin/hwasan_build
sandbox/akazmin/tizen6_asan
sandbox/chanwoochoi/tizen_dev
sandbox/denis13/LTO
sandbox/ibaravy/isan
sandbox/jihochu/5.0
sandbox/jlaako/multiseat
sandbox/jobol/v219
sandbox/kkrosman/cynara-bus-proxyd
sandbox/klewandowski/nosmack
sandbox/klewandowski/systemd-shutdown
sandbox/klewandowski/upgrade-v231
sandbox/leemgs/test
sandbox/lstelmach/exec-timing
sandbox/lstelmach/exec-timing-244
sandbox/lstelmach/kdbus-integration-216
sandbox/lstelmach/kdbus-integration-217
sandbox/lstelmach/kdbus-tizen-next
sandbox/lstelmach/system-privileged
sandbox/lstelmach/systemd-upgrade-231
sandbox/lstelmach/systemd-upgrade-233
sandbox/lstelmach/tizen-cleanup
sandbox/lstelmach/tizen-cleanup-wo-kdbus
sandbox/lstelmach/tizen-cleanup-wo-kdbus-on-v255
sandbox/lstelmach/tizen-next
sandbox/mbloch/stdout
sandbox/mkashkarov/tizen_6.0_build
sandbox/mmajewski2/stdout
sandbox/mwereski/tizen
sandbox/mzielinska3/cynara_integration
sandbox/sdx/dev212
sandbox/sebuns2/skip_empty_link_file
sandbox/silas.jeon/RO_3.0_notyet
sandbox/songinha/history
sandbox/songinha/tizen
sandbox/upgrade-to-241
sandbox/vbarinov/asan
sandbox/vbarinov/newcompilerfix
sandbox/vbarinov/nogold
systemd_212
systemd_v216
tizen
tizen-v204-backup
tizen_208
tizen_3.0
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m14.2_ivi
tizen_3.0.m14.3_ivi
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_ivi
tizen_3.0_tv
tizen_4.0
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
tizen_8.0
tizen_9.0
tizen_dev
tizen_dev_kdbus
tizen_ivi_genivi
tizen_ivi_release
upgrade-to-244
upstream
upstream_old
Domain: System / System Framework;
Hyotaek Shim <hyotaek.shim@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
shared
/
seccomp-util.h
Age
Commit message (
Expand
)
Author
Files
Lines
2018-09-24
seccomp: reduce logging about failure to add syscall to seccomp
Zbigniew Jędrzejewski-Szmek
1
-3
/
+3
2018-06-14
seccomp: add new system call filter, suitable as default whitelist for system...
Lennart Poettering
1
-0
/
+1
2018-06-14
tree-wide: remove Lennart's copyright lines
Lennart Poettering
1
-4
/
+0
2018-06-14
tree-wide: drop 'This file is part of systemd' blurb
Lennart Poettering
1
-2
/
+0
2018-06-12
tree-wide: unify how we define bit mak enums
Lennart Poettering
1
-4
/
+4
2018-04-06
tree-wide: drop license boilerplate
Zbigniew Jędrzejewski-Szmek
1
-13
/
+0
2018-02-27
seccomp: rework functions for parsing system call filters
Lennart Poettering
1
-16
/
+13
2017-12-23
core,seccomp: fix logic to parse syscall filter in dbus-execute.c
Yu Watanabe
1
-0
/
+18
2017-11-19
Add SPDX license identifiers to source files under the LGPL
Zbigniew Jędrzejewski-Szmek
1
-0
/
+1
2017-11-11
core: add support to specify errno in SystemCallFilter=
Yu Watanabe
1
-2
/
+2
2017-10-05
seccomp: add three more seccomp groups
Lennart Poettering
1
-0
/
+3
2017-10-03
seccomp: remove '@credentials' syscall set (#6958)
Djalal Harouni
1
-1
/
+0
2017-09-14
seccomp: add four new syscall groups
Lennart Poettering
1
-0
/
+4
2017-09-12
nspawn: implement configurable syscall whitelisting/blacklisting
Lennart Poettering
1
-1
/
+1
2017-09-11
seccomp: split out inner loop code of seccomp_add_syscall_filter_set()
Lennart Poettering
1
-0
/
+2
2017-08-29
seccomp: LockPersonality boolean (#6193)
Topi Miettinen
1
-0
/
+1
2017-08-10
core: add two new special ExecStart= character prefixes
Lennart Poettering
1
-0
/
+2
2017-08-10
seccomp: add new @setuid seccomp group
Lennart Poettering
1
-0
/
+1
2017-08-07
seccomp-util: add parse_syscall_archs()
Yu Watanabe
1
-0
/
+2
2017-05-10
seccomp: enable RestrictAddressFamilies on ppc64, autodetect SECCOMP_RESTRICT...
Zbigniew Jędrzejewski-Szmek
1
-8
/
+0
2017-05-07
seccomp: assume clone() arg order is known on all architectures
Zbigniew Jędrzejewski-Szmek
1
-7
/
+0
2017-05-07
seccomp: drop SECCOMP_MEMORY_DENY_WRITE_EXECUTE_BROKEN, add test for shmat
Zbigniew Jędrzejewski-Szmek
1
-7
/
+0
2017-05-03
seccomp: add clone syscall definitions for mips (#5880)
James Cowgill
1
-1
/
+1
2017-02-14
Define clone order on ppc (#5325)
Zbigniew Jędrzejewski-Szmek
1
-1
/
+1
2017-02-08
seccomp: on s390 the clone() parameters are reversed
Lennart Poettering
1
-0
/
+7
2017-02-08
seccomp: MemoryDenyWriteExecute= should affect both mmap() and mmap2() (#5254)
Lennart Poettering
1
-0
/
+7
2017-02-06
seccomp: RestrictAddressFamilies= is not supported on i386/s390/s390x, make i...
Lennart Poettering
1
-0
/
+8
2017-01-17
seccomp: rework seccomp code, to improve compat with some archs
Lennart Poettering
1
-6
/
+19
2016-12-27
seccomp: add two new filter sets: @reboot and @swap
Lennart Poettering
1
-0
/
+2
2016-11-21
seccomp: add @filesystem syscall group (#4537)
Lennart Poettering
1
-0
/
+1
2016-11-04
core: add new RestrictNamespaces= unit file setting
Lennart Poettering
1
-0
/
+2
2016-11-03
seccomp-util, analyze: export comments as a help string
Zbigniew Jędrzejewski-Szmek
1
-0
/
+1
2016-11-03
seccomp-util: move @default to the first position
Zbigniew Jędrzejewski-Szmek
1
-1
/
+2
2016-11-02
seccomp: add two new syscall groups
Lennart Poettering
1
-0
/
+2
2016-10-24
seccomp: add test-seccomp test tool
Lennart Poettering
1
-0
/
+1
2016-10-24
seccomp: add new helper call seccomp_load_filter_set()
Lennart Poettering
1
-0
/
+2
2016-10-24
seccomp: add new seccomp_init_conservative() helper
Lennart Poettering
1
-1
/
+3
2016-10-24
core: rework syscall filter set handling
Lennart Poettering
1
-5
/
+27
2016-08-22
core: do not fail at step SECCOMP if there is no kernel support (#4004)
Felipe Sateler
1
-0
/
+2
2016-06-01
core: add pre-defined syscall groups to SystemCallFilter= (#3053) (#3157)
Topi Miettinen
1
-0
/
+7
2016-02-10
tree-wide: remove Emacs lines from all files
Daniel Mack
1
-2
/
+0
2015-12-06
shared: include what we use
Thomas Hindoe Paaboel Andersen
1
-0
/
+1
2014-12-12
seccomp-util.h: make sure seccomp-util.h can be included alone
Lennart Poettering
1
-0
/
+1
2014-02-18
seccomp: add helper call to add all secondary archs to a seccomp filter
Lennart Poettering
1
-0
/
+2
2014-02-13
core: add SystemCallArchitectures= unit setting to allow disabling of non-native
Lennart Poettering
1
-0
/
+26