Will Drewry ([email protected])

Number of posts: 268 (0.06 per day)
First post: 2010-06-08 03:25:57
Last post: 2021-11-23 16:45:44

Date List Subject
2012-02-21 17:31:43 linux-kernel [PATCH v10 09/11] ptrace,seccomp: Add PTRACE_SECCOMP support
2012-02-21 17:31:38 linux-kernel [PATCH v10 07/11] signal, x86: add SIGSYS info and make it synchronous.
2012-02-21 17:31:33 linux-kernel [PATCH v10 04/11] arch/x86: add syscall_get_arch to syscall.h
2012-02-21 17:31:30 linux-kernel [PATCH v10 02/11] seccomp: kill the seccomp_t typedef
2012-02-21 17:31:28 linux-kernel [PATCH v10 01/11] sk_run_filter: add support for custom load_pointer
2012-02-21 17:31:08 linux-kernel Re: [PATCH v8 6/8] ptrace,seccomp: Add PTRACE_SECCOMP support
2012-02-17 16:24:05 linux-kernel Re: [PATCH v8 6/8] ptrace,seccomp: Add PTRACE_SECCOMP support
2012-02-17 04:40:55 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-17 04:26:26 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-17 04:13:25 linux-kernel Re: [PATCH v8 1/8] sk_run_filter: add support for custom load_pointer
2012-02-17 03:53:58 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-17 03:38:35 linux-kernel Re: [kernel-hardening] Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-17 02:22:33 linux-kernel Re: [PATCH v8 1/8] sk_run_filter: add support for custom load_pointer
2012-02-16 23:00:25 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-16 21:51:29 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-16 21:33:52 linux-kernel Re: [PATCH v8 5/8] seccomp: Add SECCOMP_RET_TRAP
2012-02-16 21:31:14 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-16 21:12:29 linux-kernel [PATCH v9 8/8] Documentation: prctl/seccomp_filter
2012-02-16 21:12:26 linux-kernel [PATCH v9 5/8] seccomp: Add SECCOMP_RET_TRAP
2012-02-16 20:42:54 linux-kernel Re: [PATCH v8 5/8] seccomp: Add SECCOMP_RET_TRAP
2012-02-16 20:25:55 linux-kernel Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-16 20:08:59 linux-kernel Re: [PATCH v8 1/8] sk_run_filter: add support for custom load_pointer
2012-02-16 20:05:19 linux-kernel [PATCH v8 3/8] seccomp: add system call filtering using BPF
2012-02-16 20:04:47 linux-kernel [PATCH v8 4/8] seccomp: add SECCOMP_RET_ERRNO
2012-02-16 20:04:27 linux-kernel [PATCH v8 6/8] ptrace,seccomp: Add PTRACE_SECCOMP support
2012-02-16 20:03:37 linux-kernel [PATCH v8 8/8] Documentation: prctl/seccomp_filter
2012-02-16 20:03:31 linux-kernel [PATCH v8 7/8] x86: Enable HAVE_ARCH_SECCOMP_FILTER
2012-02-16 20:03:27 linux-kernel [PATCH v8 5/8] seccomp: Add SECCOMP_RET_TRAP
2012-02-16 20:03:19 linux-kernel [PATCH v8 2/8] seccomp: kill the seccomp_t typedef
2012-02-16 20:03:15 linux-kernel [PATCH v8 1/8] sk_run_filter: add support for custom load_pointer
2012-02-06 16:13:52 linux-kernel Re: [PATCH v6 1/3] seccomp: kill the seccomp_t typedef
2012-02-03 23:16:11 linux-kernel Re: [PATCH v6 1/3] seccomp: kill the seccomp_t typedef
2012-02-03 23:14:57 linux-kernel Re: [PATCH v6 2/3] seccomp_filters: system call filtering using BPF
2012-02-01 09:02:18 linux-kernel Re: [PATCH v5 2/3] seccomp_filters: system call filtering using BPF
2011-06-30 21:13:23 linux-kernel [PATCH v3 2/2] Documentation: add pointer to name_to_dev_t for root= values
2011-06-30 21:13:14 linux-kernel [PATCH v3 1/2] init: add root=PARTUUID=UUID/PARTNROFF=%d support
2011-06-30 21:02:40 linux-kernel Re: [PATCH v2] init: add root=PARTUUID=UUID,PARTNROFF=%d support
2011-06-29 19:13:15 linux-kernel Re: [PATCH v9 05/13] seccomp_filter: Document what seccomp_filter is and how it works.
2011-06-26 18:01:14 linux-kernel Re: [PATCH v2] init: add root=PARTUUID=UUID,PARTNROFF=%d support
2011-06-24 19:53:22 linux-kernel Re: [PATCH v2] init: add root=PARTUUID=UUID,PARTNROFF=%d support
2011-06-24 00:41:21 linux-kernel [PATCH v9 04/13] seccomp_filter: add process state reporting
2011-06-24 00:40:57 linux-kernel [PATCH v9 05/13] seccomp_filter: Document what seccomp_filter is and how it works.
2011-06-24 00:40:09 linux-kernel [PATCH v9 06/13] x86: add HAVE_SECCOMP_FILTER and seccomp_execve
2011-06-24 00:39:50 linux-kernel [PATCH v9 08/13] microblaze: select HAVE_SECCOMP_FILTER and provide seccomp_execve
2011-06-24 00:39:16 linux-kernel [PATCH v9 10/13] s390: select HAVE_SECCOMP_FILTER and provide seccomp_execve
2011-06-24 00:38:53 linux-kernel [PATCH v9 11/13] powerpc: select HAVE_SECCOMP_FILTER and provide seccomp_execve
2011-06-24 00:38:26 linux-kernel [PATCH v9 13/13] sh: select HAVE_SECCOMP_FILTER
2011-06-24 00:38:23 linux-kernel [PATCH v9 12/13] sparc: select HAVE_SECCOMP_FILTER and provide seccomp_execve
2011-06-24 00:38:19 linux-kernel [PATCH v9 09/13] mips: select HAVE_SECCOMP_FILTER and provide seccomp_execve
2011-06-24 00:38:13 linux-kernel [PATCH v9 07/13] arm: select HAVE_SECCOMP_FILTER
2011-06-24 00:38:08 linux-kernel [PATCH v9 03/13] seccomp_filter: new mode with configurable syscall filters