summaryrefslogtreecommitdiff
path: root/kernel/seccomp.c
Commit message (Expand)AuthorAgeFilesLines
* seccomp: Set PF_SUPERPRIV when checking capabilityMickaël Salaün2020-11-171-3/+2
* seccomp: Make duplicate listener detection non-racyJann Horn2020-10-081-7/+31
* seccomp: Use current_pt_regs() instead of task_pt_regs(current)Denis Efremov2020-09-081-7/+11
* seccomp: kill process instead of thread for unknown actionsRich Felker2020-09-081-4/+4
* seccomp: don't leave dangling ->notif if file allocation failsTycho Andersen2020-09-081-3/+8
* seccomp: don't leak memory when filter install racesTycho Andersen2020-09-081-3/+10
* seccomp: Introduce addfd ioctl to seccomp user notifierSargun Dhillon2020-07-141-2/+173
* seccomp: Use -1 marker for end of mode 1 syscall listKees Cook2020-07-101-5/+5
* seccomp: Fix ioctl number for SECCOMP_IOCTL_NOTIF_ID_VALIDKees Cook2020-07-101-0/+9
* seccomp: Use pr_fmtKees Cook2020-07-101-1/+2
* seccomp: notify about unused filterChristian Brauner2020-07-101-5/+39
* seccomp: Lift wait_queue into struct seccomp_filterChristian Brauner2020-07-101-6/+6
* seccomp: release filter after task is fully deadChristian Brauner2020-07-101-25/+37
* seccomp: rename "usage" to "refs" and documentChristian Brauner2020-07-101-9/+10
* seccomp: Add find_notification helperSargun Dhillon2020-07-101-26/+27
* seccomp: Report number of loaded filters in /proc/$pid/statusKees Cook2020-07-101-0/+3
* sysctl: pass kernel pointers to ->proc_handlerChristoph Hellwig2020-04-271-1/+1
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-nextLinus Torvalds2020-03-311-3/+1
|\
| * bpf: Use bpf_prog_run_pin_on_cpu() at simple call sites.David Miller2020-02-241-3/+1
* | seccomp: Add missing compat_ioctl for notifySven Schnelle2020-03-291-0/+1
* | seccomp: allow TSYNC and USER_NOTIF togetherTycho Andersen2020-03-041-4/+10
|/
* seccomp: Check that seccomp_notif is zeroed out by the userSargun Dhillon2020-01-021-0/+7
* seccomp: add SECCOMP_USER_NOTIF_FLAG_CONTINUEChristian Brauner2019-10-101-6/+22
* signal: Remove the signal number and task parameters from force_sig_infoEric W. Biederman2019-05-291-1/+1
* Merge tag 'audit-pr-20190507' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-05-071-2/+2
|\
| * syscall_get_arch: add "struct task_struct *" argumentDmitry V. Levin2019-03-201-2/+2
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2019-05-071-1/+1
|\ \
| * | seccomp: fix up grammar in commentTycho Andersen2019-04-231-1/+1
| |/
* | Merge tag 'seccomp-v5.1-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-04-291-2/+15
|\ \
| * | seccomp: Make NEW_LISTENER and TSYNC flags exclusiveTycho Andersen2019-04-251-2/+15
| |/
* | syscalls: Remove start and number from syscall_get_arguments() argsSteven Rostedt (Red Hat)2019-04-051-1/+1
|/
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2019-03-071-2/+2
|\
| * Merge tag 'v5.0-rc3' into next-generalJames Morris2019-01-221-0/+4
| |\
| * | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-2/+2
* | | seccomp, bpf: disable preemption before calling into bpf progAlexei Starovoitov2019-02-221-0/+2
| |/ |/|
* | seccomp: fix UAF in user-trap codeTycho Andersen2019-01-151-0/+4
|/
* seccomp: fix poor type promotionTycho Andersen2018-12-131-2/+1
* seccomp: add a return code to trap to userspaceTycho Andersen2018-12-111-2/+446
* seccomp: switch system call argument type to void *Tycho Andersen2018-12-111-4/+4
* seccomp: hoist struct seccomp_data recalculation higherTycho Andersen2018-12-111-6/+6
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-241-2/+2
|\
| * seccomp: remove unnecessary unlikely()Igor Stoppa2018-09-061-2/+2
* | signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman2018-10-031-3/+3
|/
* Merge tag 'audit-pr-20180605' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-06-061-36/+90
|\
| * seccomp: Don't special case audited processes when loggingTyler Hicks2018-05-081-10/+7
| * seccomp: Audit attempts to modify the actions_logged sysctlTyler Hicks2018-05-081-9/+49
| * seccomp: Configurable separator for the actions_logged stringTyler Hicks2018-05-081-6/+7
| * seccomp: Separate read and write code for actions_logged sysctlTyler Hicks2018-05-081-22/+38
* | seccomp: Move speculation migitation control to arch codeThomas Gleixner2018-05-051-13/+2
* | seccomp: Add filter flag to opt-out of SSB mitigationKees Cook2018-05-051-8/+11