Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 25 Jul 2015 20:35:27 +0200
From: Szabolcs Nagy <>
Subject: Re: Using direct socket syscalls on x86_32 where available?

* Andy Lutomirski <> [2015-07-25 10:54:28 -0700]:
> If userspace adapts by preferring the direct syscalls when available,
> it'll make it easier for seccomp to filter new userspace programs
> (and, ideally, eventually disallow socketcall for sandbox-aware code).

btw is there a nice cmdline tool for seccomp now?

or is the api still manual construction of bpf byte code in c?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.