summaryrefslogtreecommitdiff
AgeCommit messageAuthorFilesLines
2018-05-22seccomp: Move speculation migitation control to arch codeThomas Gleixner3-24/+22
2018-05-22seccomp: Add filter flag to opt-out of SSB mitigationKees Cook4-11/+93
2018-05-22seccomp: Use PR_SPEC_FORCE_DISABLEThomas Gleixner1-1/+1
2018-05-22seccomp: Enable speculation flaw mitigationsKees Cook1-0/+17
2017-10-05seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter()Oleg Nesterov1-7/+16
2016-08-30seccomp: Fix tracer exit notifications during fatal signalsKees Cook1-4/+8
2016-08-04tree-wide: replace config_enabled() with IS_ENABLED()Masahiro Yamada48-135/+135
2016-06-14seccomp: recheck the syscall after RET_TRACEKees Cook1-3/+18
2016-06-14seccomp: remove 2-phase APIKees Cook2-94/+41
2016-06-14seccomp: Add a seccomp_data parameter secure_computing()Andy Lutomirski11-15/+15
2016-05-19Merge branch 'upstream' of git://git.linux-mips.org/pub/scm/ralf/upstream-linusLinus Torvalds358-3399/+14005
2016-05-13secomp: Constify mode1 syscall whitelistMatt Redfearn1-2/+2
2016-05-13seccomp: Get compat syscalls from asm-generic headerMatt Redfearn2-8/+15
2016-05-04seccomp: Fix comment typoMickaël Salaün1-1/+1
2016-03-22seccomp: check in_compat_syscall, not is_compat_task, in strict modeAndy Lutomirski1-2/+2
2016-01-27seccomp: always propagate NO_NEW_PRIVS on tsyncJann Horn1-11/+11
2015-10-28seccomp, ptrace: add support for dumping seccomp filtersTycho Andersen4-1/+93
2015-10-05bpf, seccomp: prepare for upcoming criu supportDaniel Borkmann4-9/+15
2015-07-20Merge tag 'seccomp-next' of git://git.kernel.org/pub/scm/linux/kernel/git/kee...James Morris5-8/+31
2015-07-15seccomp: swap hard-coded zeros to defined nameKees Cook2-2/+2
2015-07-15seccomp: add ptrace options for suspend/resumeTycho Andersen4-2/+26
2015-07-15seccomp: Replace smp_read_barrier_depends() with lockless_dereference()Pranith Kumar1-4/+3
2015-05-09seccomp, filter: add and use bpf_prog_create_from_user from seccompDaniel Borkmann3-39/+66
2015-05-09seccomp: simplify seccomp_prepare_filter and reuse bpf_prepare_filterNicolas Schichan3-54/+26
2015-02-17seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNOKees Cook1-1/+3
2014-10-14Merge branch 'x86-seccomp-for-linus' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds11-157/+371
2014-09-05net: bpf: make eBPF interpreter images read-onlyDaniel Borkmann11-32/+144
2014-09-03seccomp: Allow arch code to provide seccomp_dataAndy Lutomirski2-14/+20
2014-09-03seccomp: Refactor the filter callback and the APIAndy Lutomirski2-66/+130
2014-09-03seccomp,x86,arm,mips,s390: Remove nr parameter from secure_computingAndy Lutomirski7-34/+66
2014-08-11seccomp: Replace BUG(!spin_is_locked()) with assert_spin_lockGuenter Roeck2-6/+6
2014-08-06Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-nextLinus Torvalds1159-30780/+70878
2014-08-02net: filter: split 'struct sk_filter' into socket and bpf partsAlexei Starovoitov21-169/+183
2014-08-02net: filter: rename sk_convert_filter() -> bpf_convert_filter()Alexei Starovoitov5-14/+14
2014-08-02net: filter: rename sk_chk_filter() -> bpf_check_classic()Alexei Starovoitov5-10/+10
2014-07-25net: filter: rename 'struct sock_filter_int' into 'struct bpf_insn'Alexei Starovoitov6-39/+39
2014-07-18seccomp: implement SECCOMP_FILTER_FLAG_TSYNCKees Cook4-2/+140
2014-07-18seccomp: allow mode setting across threadsKees Cook1-11/+25
2014-07-18seccomp: introduce writer lockingKees Cook3-5/+66
2014-07-18seccomp: split filter prep from check and applyKees Cook1-30/+67
2014-07-18sched: move no_new_privs into new atomic flagsKees Cook5-10/+22
2014-07-18seccomp: add "seccomp" syscallKees Cook8-6/+65
2014-07-18seccomp: split mode setting routinesKees Cook1-23/+48
2014-07-18seccomp: extract check/assign mode helpersKees Cook1-4/+18
2014-07-18seccomp: create internal mode-setting functionKees Cook1-2/+14
2014-06-12Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-nextLinus Torvalds1266-22890/+61475
2014-06-06kernel/seccomp.c: kernel-doc warning fixFabian Frederick1-2/+2
2014-06-02net: filter: get rid of BPF_S_* enumDaniel Borkmann8-649/+498
2014-05-21net: filter: cleanup invocation of internal BPFAlexei Starovoitov4-26/+34
2014-05-15seccomp: JIT compile seccomp filterAlexei Starovoitov1-9/+20
[next]