On Wed, 31 Oct 2012 13:09:27 -0700
Kees Cook wrote:
> Adds the seccomp mode to the /proc/$pid/status file so the state of
> seccomp can be externally examined.
There's no reason here for anyone to apply this patch to anything.
Presumably you see some value to our users - please share your
On Wed, Oct 31, 2012 at 01:09:27PM -0700, Kees Cook wrote:
> Adds the seccomp mode to the /proc/$pid/status file so the state of
> seccomp can be externally examined.
>
> Signed-off-by: Kees Cook
Reviewed-by: Cyrill Gorcunov
--
To unsubscribe from this list: send the line "unsubscribe
Adds the seccomp mode to the /proc/$pid/status file so the state of
seccomp can be externally examined.
Signed-off-by: Kees Cook
---
fs/proc/array.c |8
1 file changed, 8 insertions(+)
diff --git a/fs/proc/array.c b/fs/proc/array.c
index c1c207c..135d6ac 100644
---
Adds the seccomp mode to the /proc/$pid/status file so the state of
seccomp can be externally examined.
Signed-off-by: Kees Cook keesc...@chromium.org
---
fs/proc/array.c |8
1 file changed, 8 insertions(+)
diff --git a/fs/proc/array.c b/fs/proc/array.c
index c1c207c..135d6ac
On Wed, Oct 31, 2012 at 01:09:27PM -0700, Kees Cook wrote:
Adds the seccomp mode to the /proc/$pid/status file so the state of
seccomp can be externally examined.
Signed-off-by: Kees Cook keesc...@chromium.org
Reviewed-by: Cyrill Gorcunov gorcu...@openvz.org
--
To unsubscribe from this list:
On Wed, 31 Oct 2012 13:09:27 -0700
Kees Cook keesc...@chromium.org wrote:
Adds the seccomp mode to the /proc/$pid/status file so the state of
seccomp can be externally examined.
There's no reason here for anyone to apply this patch to anything.
Presumably you see some value to our users -
6 matches
Mail list logo