summaryrefslogtreecommitdiffstats
path: root/kernel/seccomp.c
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'x86-seccomp-for-linus' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2014-10-141-81/+171
|\
| * seccomp: Allow arch code to provide seccomp_dataAndy Lutomirski2014-09-031-13/+19
| * seccomp: Refactor the filter callback and the APIAndy Lutomirski2014-09-031-66/+124
| * seccomp,x86,arm,mips,s390: Remove nr parameter from secure_computingAndy Lutomirski2014-09-031-19/+45
* | net: bpf: make eBPF interpreter images read-onlyDaniel Borkmann2014-09-051-4/+3Star
|/
* seccomp: Replace BUG(!spin_is_locked()) with assert_spin_lockGuenter Roeck2014-08-111-5/+5
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-nextLinus Torvalds2014-08-061-10/+10
|\
| * net: filter: split 'struct sk_filter' into socket and bpf partsAlexei Starovoitov2014-08-031-5/+5
| * net: filter: rename sk_convert_filter() -> bpf_convert_filter()Alexei Starovoitov2014-08-031-2/+2
| * net: filter: rename sk_chk_filter() -> bpf_check_classic()Alexei Starovoitov2014-08-031-2/+2
| * net: filter: rename 'struct sock_filter_int' into 'struct bpf_insn'Alexei Starovoitov2014-07-251-1/+1
* | seccomp: implement SECCOMP_FILTER_FLAG_TSYNCKees Cook2014-07-181-1/+134
* | seccomp: allow mode setting across threadsKees Cook2014-07-181-11/+25
* | seccomp: introduce writer lockingKees Cook2014-07-181-1/+15
* | seccomp: split filter prep from check and applyKees Cook2014-07-181-30/+67
* | sched: move no_new_privs into new atomic flagsKees Cook2014-07-181-1/+1
* | seccomp: add "seccomp" syscallKees Cook2014-07-181-5/+50
* | seccomp: split mode setting routinesKees Cook2014-07-181-23/+48
* | seccomp: extract check/assign mode helpersKees Cook2014-07-181-4/+18
* | seccomp: create internal mode-setting functionKees Cook2014-07-181-2/+14
|/
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-nextLinus Torvalds2014-06-121-51/+59
|\
| * net: filter: get rid of BPF_S_* enumDaniel Borkmann2014-06-021-42/+41Star
| * net: filter: cleanup invocation of internal BPFAlexei Starovoitov2014-05-211-4/+2Star
| * seccomp: JIT compile seccomp filterAlexei Starovoitov2014-05-151-9/+20
* | kernel/seccomp.c: kernel-doc warning fixFabian Frederick2014-06-071-2/+2
|/
* seccomp: fix memory leak on filter attachKees Cook2014-04-161-0/+2
* seccomp: fix populating a0-a5 syscall args in 32-bit x86 BPFDaniel Borkmann2014-04-141-9/+8Star
* Merge git://git.infradead.org/users/eparis/auditLinus Torvalds2014-04-121-2/+2
|\
| * syscall_get_arch: remove useless function argumentsEric Paris2014-03-201-2/+2
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2014-04-031-1/+1
|\ \
| * | kernel: Mark function as static in kernel/seccomp.cRashika Kheria2014-02-281-1/+1
| |/
* / net: filter: rework/optimize internal BPF interpreter's instruction setAlexei Starovoitov2014-03-311-61/+58Star
|/
* seccomp: allow BPF_XOR based ALU instructions.Nicolas Schichan2013-03-261-0/+2
* seccomp: Make syscall skipping and nr changes more consistentAndy Lutomirski2012-10-021-3/+10
* seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTERWill Drewry2012-04-181-4/+9
* ptrace,seccomp: Add PTRACE_SECCOMP supportWill Drewry2012-04-141-0/+16
* seccomp: Add SECCOMP_RET_TRAPWill Drewry2012-04-141-0/+26
* seccomp: add SECCOMP_RET_ERRNOWill Drewry2012-04-141-10/+32
* seccomp: remove duplicated failure loggingKees Cook2012-04-141-14/+1Star
* seccomp: add system call filtering using BPFWill Drewry2012-04-141-18/+378
* seccomp: audit abnormal end to a process due to seccompEric Paris2012-01-171-0/+2
* x86-64: seccomp: fix 32/64 syscall holeRoland McGrath2009-03-031-3/+4
* make seccomp zerocost in scheduleAndrea Arcangeli2007-07-161-0/+3
* move seccomp from /proc to a prctlAndrea Arcangeli2007-07-161-0/+26
* Linux-2.6.12-rc2Linus Torvalds2005-04-171-0/+56