|
Message-ID: <20150725183527.GB13650@port70.net> Date: Sat, 25 Jul 2015 20:35:27 +0200 From: Szabolcs Nagy <nsz@...t70.net> To: musl@...ts.openwall.com Subject: Re: Using direct socket syscalls on x86_32 where available? * Andy Lutomirski <luto@...capital.net> [2015-07-25 10:54:28 -0700]: > If userspace adapts by preferring the direct syscalls when available, > it'll make it easier for seccomp to filter new userspace programs > (and, ideally, eventually disallow socketcall for sandbox-aware code). btw is there a nice cmdline tool for seccomp now? or is the api still manual construction of bpf byte code in c?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.