Commit message (Expand)AuthorAgeFilesLines
* security.c: whitelist ipc() syscall for fakeroot on ppc64 and friendsHEADv1.2.4masterSergei Trofimovich2019-01-141-0/+6
* security: fix building on much older systemsv1.2Mike Frysinger2017-01-211-1/+24
* security: whitelist readlinkatv1.1.6Mike Frysinger2016-03-031-0/+1
* security: allow more read/write syscallsMike Frysinger2016-02-101-0/+5
* security: whitelist the getcwd syscallv1.1.4Mike Frysinger2015-10-261-0/+1
* security: fix build on systems w/out si_syscallv1.1.3Mike Frysinger2015-09-191-1/+4
* security: whitelist the futex syscallMike Frysinger2015-09-191-0/+3
* security: whitelist dup syscallsv1.1.2Mike Frysinger2015-09-111-0/+3
* security: do not warn when seccomp is disabled in the kernelv1.1.1Mike Frysinger2015-08-271-2/+5
* security: whitelist fakeroot syscallsMike Frysinger2015-08-261-0/+7
* security: add a debug handler for seccompMike Frysinger2015-08-241-1/+26
* security: clean up syscall ifdefsMike Frysinger2015-08-241-18/+0
* security: use seccomp to lock ourselves downv1.1Mike Frysinger2015-08-201-0/+147
* security: lock down privs a bit via prctlMike Frysinger2015-08-201-0/+9
* security: leverage namespaces to restrict the runtime a bitMike Frysinger2015-08-201-0/+89