Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | cleanup after scan-build | 2019-10-31 | |
| | |||
* | Update libpostexecseccomp.c (#2851) | 2019-07-11 | |
| | | | | | | | | | * Update libpostexecseccomp.c Remove `if (size != 0)` condition, which is always true as there is a `if (size <= 0)` condition before. Also note that if the `if (size <= 0)` condition wouldn't be there and `size` would be 0, there would have been an undefined behavior in due to division by zero in `(unsigned short) size / (unsigned short) sizeof(struct sock_filter);`. Found with LGTM: https://lgtm.com/projects/g/netblue30/firejail/snapshot/961c4ca00425b60a7bc8543460031a8ebf3d8aa6/files/src/libpostexecseccomp/libpostexecseccomp.c#x838c24f710410160:1 | ||
* | fix previous commit, more seccomp testing | 2019-04-09 | |
| | |||
* | seccomp fixes | 2019-04-09 | |
| | |||
* | move copyright statement to 2019 | 2019-02-07 | |
| | |||
* | cleanup | 2018-09-05 | |
| | |||
* | cleanup | 2018-08-29 | |
| | |||
* | memory leaks | 2018-08-28 | |
| | |||
* | move copyright statement to 2018 | 2018-01-14 | |
| | |||
* | Fix compile with older kernel headers | 2017-08-13 | |
| | |||
* | Allow any syscall to be blacklisted (#1447) | 2017-08-13 | |
Allow any syscall to be blacklisted with aid of LD_PRELOAD library, libpostexecseccomp.so. Closes: #1447 |