libseccomp icon indicating copy to clipboard operation
libseccomp copied to clipboard

The main libseccomp repository

Results 73 libseccomp issues
Sort by recently updated
recently updated
newest added

Please add support for checking (preferrably multiple and masked) range(s) of values. For example in systemd (https://github.com/systemd/systemd/pull/6256) we'd like to construct a filter which only allows `personality(2)` with following use...

enhancement
priority/medium

Hi, I have a usage of libseccomp that involves a 64-bit process setting up a filter for and then launching a 32-bit process, with `SCMP_ACT_TRACE` and using `ptrace` for syscall...

enhancement
priority/low

While the libseccomp devs understand the purpose and motivation behind the pseudo-syscalls, they may seem like an odd concept to users of the library. We should do a better job...

enhancement
priority/low

When building software on top of libseccomp sometimes we are stuck with older version of libseccomp. When someone e.g. runs with RHEL or an ubuntu LTS the syscall table is...

enhancement
priority/low

> The seccomp_syscall_resolve_name(), seccomp_syscall_resolve_name_arch(), and seccomp_syscall_resolve_name_rewrite() functions resolve the commonly used syscall name to the syscall number used by the kernel and the rest of the libseccomp API I've been...

question
priority/medium

Are there any plans to support pledge from openbsd? I imagine it would be easy to implement a simple wrapper that allows to use pledge as a kind of alias...

enhancement
priority/low

We have some basic tooling to generate (tests/testgen) and compare (tests/testdiff) BPF output from multiple test runs, we should investigate adding known good BPF output from the tests to the...

enhancement
priority/low

The SCMP_FLTATR_CTL_WAITKILL attribute requests that the SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV flag be passed to the seccomp(2) system call when possible, which is currently only when the SECCOMP_FILTER_FLAG_NEW_LISTENER flag is also set. Resolves #387

enhancement
priority/medium

Linux 5.19 introduced a new seccomp flag: SECCOMP_FILTER_FLAG_WAIT_KILLABLE_RECV https://github.com/torvalds/linux/commit/c2aa2dfef243 I would like to use it to handle notification from Golang programs which are often preempted by the runtime with SIGURG....

enhancement
priority/medium