seccomp / libseccomp Public
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Q: SCMP_FLTATR_API_TSKIP does not seem to be used by tracer programs
pending/review
priority/medium
question
#368
opened Jan 30, 2022 by
ManaSugi
RFE: allow adding an exact syscall number for an architecture
enhancement
priority/low
#259
opened Jun 25, 2020 by
Xyene
RFE: allow adding syscall definitions dynamically
enhancement
priority/low
#129
opened Sep 13, 2018 by
mvo5
RFE: allow filtering on the caller's instruction pointer
enhancement
priority/medium
#113
opened Mar 20, 2018 by
pcmoore
Q: seccomp_syscall_resolve_name_arch(...) is confusing, docs arguably wrong
priority/medium
question
#104
opened Jan 31, 2018 by
sourcejedi
RFE: Document libseccomp usage in multithreaded environment
enhancement
priority/medium
#102
opened Nov 17, 2017 by
Talkless
RFE: add support for OpenBSD's pledge(2) mechanism
enhancement
priority/low
#71
opened Jan 31, 2017 by
pete3215
Previous Next
ProTip!
Exclude everything labeled
bug with -label:bug.