All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v4 0/4] arch/arm: support seccomp
@ 2012-11-08 20:59 Kees Cook
  2012-11-08 20:59 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
                   ` (4 more replies)
  0 siblings, 5 replies; 13+ messages in thread
From: Kees Cook @ 2012-11-08 20:59 UTC (permalink / raw)
  To: linux-kernel
  Cc: Russell King, Will Deacon, Geremy Condra, Catalin Marinas,
	Al Viro, Kees Cook, Will Drewry

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees

---
v4:
 - fixed syscall_get_arch, thanks to Will Deacon.
v3:
 - updates suggested by Russell King:
   - reduced scope of expansion
   - leveraged TIF_SYSCALL_WORK bit mask
   - fixed syscall==-1 short-circuit logic
v2:
 - expanded ptrace_syscall_trace() into both callers and do
   secure_computing() hookup there, as requested by Al Viro.




^ permalink raw reply	[flat|nested] 13+ messages in thread
* [PATCH v5 0/4] arch/arm: support seccomp
@ 2012-11-10 22:44 Kees Cook
  2012-11-10 22:44   ` Kees Cook
  0 siblings, 1 reply; 13+ messages in thread
From: Kees Cook @ 2012-11-10 22:44 UTC (permalink / raw)
  To: linux-arm-kernel
  Cc: linux-kernel, Russell King, Will Deacon, Geremy Condra,
	Catalin Marinas, Al Viro, Kees Cook, Will Drewry

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees

---
v5:
 - clean up seccomp failure path, as requested by Will Deacon.
v4:
 - fixed syscall_get_arch, thanks to Will Deacon.
v3:
 - updates suggested by Russell King:
   - reduced scope of expansion
   - leveraged TIF_SYSCALL_WORK bit mask
   - fixed syscall==-1 short-circuit logic
v2:
 - expanded ptrace_syscall_trace() into both callers and do
   secure_computing() hookup there, as requested by Al Viro.


^ permalink raw reply	[flat|nested] 13+ messages in thread
* [PATCH v3 0/4] arch/arm: support seccomp
@ 2012-11-02  0:14 Kees Cook
  2012-11-02  0:14 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
  0 siblings, 1 reply; 13+ messages in thread
From: Kees Cook @ 2012-11-02  0:14 UTC (permalink / raw)
  To: linux-kernel
  Cc: Russell King, Will Deacon, Will Drewry, Geremy Condra, Al Viro,
	Catalin Marinas

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees

---
v3:
 - updates suggested by Russell King:
   - reduced scope of expansion
   - leveraged TIF_SYSCALL_WORK bit mask
   - fixed syscall==-1 short-circuit logic
   
v2:
 - expanded ptrace_syscall_trace() into both callers and do
   secure_computing() hookup there, as requested by Al Viro.



^ permalink raw reply	[flat|nested] 13+ messages in thread
* [PATCH v2 0/4] arch/arm: support seccomp
@ 2012-11-01 19:46 Kees Cook
  2012-11-01 19:46 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
  0 siblings, 1 reply; 13+ messages in thread
From: Kees Cook @ 2012-11-01 19:46 UTC (permalink / raw)
  To: linux-kernel
  Cc: Russell King, Will Deacon, Will Drewry, Geremy Condra, Al Viro,
	Catalin Marinas

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees

---
v2:
 - expanded ptrace_syscall_trace() into both callers and do
   secure_computing() hookup there, as requested by Al Viro.


^ permalink raw reply	[flat|nested] 13+ messages in thread
* [PATCH 0/4] arch/arm: support seccomp
@ 2012-10-30  0:41 Kees Cook
  2012-10-30  0:41 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
  0 siblings, 1 reply; 13+ messages in thread
From: Kees Cook @ 2012-10-30  0:41 UTC (permalink / raw)
  To: linux-kernel; +Cc: Russell King, Will Deacon, Will Drewry, Geremy Condra

This adds support for seccomp BPF to ARM. When built with the seccomp
improvement patch waiting in linux-next ("seccomp: Make syscall skipping
and nr changes more consistent"), this passes the seccomp regression
test suite: https://github.com/redpig/seccomp

Thanks,

-Kees


^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2012-11-10 22:46 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-11-08 20:59 [PATCH v4 0/4] arch/arm: support seccomp Kees Cook
2012-11-08 20:59 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
2012-11-08 20:59 ` [PATCH 2/4] arch/arm: move secure_computing into trace Kees Cook
2012-11-09 11:56   ` Will Deacon
2012-11-08 20:59 ` [PATCH 3/4] arch/arm: allow a scno of -1 to not cause a SIGILL Kees Cook
2012-11-08 20:59 ` [PATCH 4/4] arch/arm: select HAVE_ARCH_SECCOMP_FILTER Kees Cook
2012-11-08 21:22 ` [PATCH v4 0/4] arch/arm: support seccomp Nicolas Pitre
  -- strict thread matches above, loose matches on Subject: below --
2012-11-10 22:44 [PATCH v5 " Kees Cook
2012-11-10 22:44 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
2012-11-10 22:44   ` Kees Cook
2012-11-02  0:14 [PATCH v3 0/4] arch/arm: support seccomp Kees Cook
2012-11-02  0:14 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
2012-11-05 13:29   ` Will Deacon
2012-11-01 19:46 [PATCH v2 0/4] arch/arm: support seccomp Kees Cook
2012-11-01 19:46 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook
2012-10-30  0:41 [PATCH 0/4] arch/arm: support seccomp Kees Cook
2012-10-30  0:41 ` [PATCH 1/4] arch/arm: add syscall_get_arch Kees Cook

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.