3.16.58-rc1 review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit 48dc92b9fc3926844257316e75ba11eb5c742b2c upstream.
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument
3.16.58-rc1 review patch. If anyone has any objections, please let me know.
--
From: Kees Cook
commit 48dc92b9fc3926844257316e75ba11eb5c742b2c upstream.
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument
mmitter: Kees Cook
>> CommitDate: Fri Jul 18 12:13:37 2014 -0700
>>
>> seccomp: add "seccomp" syscall
>>
>> This adds the new "seccomp" syscall with both an "operation" and "flags"
>> parameter for futu
keesc...@chromium.org
CommitDate: Fri Jul 18 12:13:37 2014 -0700
seccomp: add seccomp syscall
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation
> Parent: 3b23dd12846215eff4afb073366b80c0c4d7543e
> Refname:refs/heads/master
> Author: Kees Cook
> AuthorDate: Wed Jun 25 16:08:24 2014 -0700
> Committer: Kees Cook
> CommitDate: Fri Jul 18 12:13:37 2014 -0700
>
> seccomp: add "seccomp" syscall
>
>
Parent: 3b23dd12846215eff4afb073366b80c0c4d7543e
Refname:refs/heads/master
Author: Kees Cook keesc...@chromium.org
AuthorDate: Wed Jun 25 16:08:24 2014 -0700
Committer: Kees Cook keesc...@chromium.org
CommitDate: Fri Jul 18 12:13:37 2014 -0700
seccomp: add seccomp syscall
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
In addition to the
Hi Kees,
On Wed, Jun 11, 2014 at 5:25 AM, Kees Cook wrote:
> This adds the new "seccomp" syscall with both an "operation" and "flags"
> parameter for future expansion. The third argument is a pointer value,
> used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
> be 0. This is
Hi Kees,
On Wed, Jun 11, 2014 at 5:25 AM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be
On Fri, Jun 13, 2014 at 2:42 PM, Andy Lutomirski wrote:
> On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov wrote:
>> On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski wrote:
>>> On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov
>>> wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook
On Fri, Jun 13, 2014 at 2:42 PM, Andy Lutomirski wrote:
> On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov wrote:
>> On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski wrote:
>>> On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov
>>> wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov wrote:
> On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
>> This adds the new "seccomp" syscall with both an "operation" and "flags"
>> parameter for future expansion. The third argument is a pointer value,
>> used with the
On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov wrote:
> On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski wrote:
>> On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov
>> wrote:
>>> On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
This adds the new "seccomp" syscall with both an
On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski wrote:
> On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov wrote:
>> On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
>>> This adds the new "seccomp" syscall with both an "operation" and "flags"
>>> parameter for future expansion. The third
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov wrote:
> On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
>> This adds the new "seccomp" syscall with both an "operation" and "flags"
>> parameter for future expansion. The third argument is a pointer value,
>> used with the
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
> This adds the new "seccomp" syscall with both an "operation" and "flags"
> parameter for future expansion. The third argument is a pointer value,
> used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
> be 0. This is
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook wrote:
> This adds the new "seccomp" syscall with both an "operation" and "flags"
> parameter for future expansion. The third argument is a pointer value,
> used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
> be 0. This is
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used
On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov a...@plumgrid.com
wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Tue, Jun 10, 2014 at 8:25 PM, Kees Cook keesc...@chromium.org wrote:
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used
On Fri, Jun 13, 2014 at 2:42 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov
On Fri, Jun 13, 2014 at 2:42 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:37 PM, Alexei Starovoitov a...@plumgrid.com wrote:
On Fri, Jun 13, 2014 at 2:25 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Jun 13, 2014 at 2:22 PM, Alexei Starovoitov
This adds the new "seccomp" syscall with both an "operation" and "flags"
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
This adds the new seccomp syscall with both an operation and flags
parameter for future expansion. The third argument is a pointer value,
used with the SECCOMP_SET_MODE_FILTER operation. Currently, flags must
be 0. This is functionally equivalent to prctl(PR_SET_SECCOMP, ...).
Signed-off-by: Kees
38 matches
Mail list logo