[<prev month] [next month>] [year] [list]
kernel-hardening mailing list - 2016/09
Messages by day:
September 1 (1 message)
September 2 (14 messages)
September 5 (4 messages)
September 6 (5 messages)
September 7 (3 messages)
September 8 (4 messages)
September 9 (4 messages)
September 10 (2 messages)
September 11 (2 messages)
September 12 (4 messages)
September 13 (11 messages)
September 14 (66 messages)
- [RFC PATCH v2 0/3] Add support for eXclusive Page Frame Ownership (XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 1/3] Add support for eXclusive Page Frame Ownership (XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 2/3] xpfo: Only put previous userspace pages into the hot cache (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 3/3] block: Always use a bounce buffer when XPFO is enabled (Juerg Haefliger <juerg.haefliger@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive Page Frame Ownership
(XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC v3 04/22] bpf: Set register type according to is_valid_access() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 01/22] landlock: Add Kconfig (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 02/22] bpf: Move u64_to_ptr() to BPF headers and inline it (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 05/22] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 09/22] seccomp: Move struct seccomp_filter in seccomp.h (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 08/22] seccomp: Fix documentation for struct seccomp_filter (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 00/22] Landlock LSM: Unprivileged sandboxing (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 06/22] landlock: Add LSM hooks (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 10/22] seccomp: Split put_seccomp_filter() with put_seccomp() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 15/22] bpf/cgroup: Move capability check (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 14/22] bpf/cgroup: Make cgroup_bpf_update() return an error code (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 12/22] bpf: Cosmetic change for bpf_prog_attach() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 13/22] bpf/cgroup: Replace struct bpf_prog with union bpf_object (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 17/22] cgroup: Add access check for cgroup_get_from_fd() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per process hierarchy (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the Landlock context (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 19/22] landlock: Add interrupted origin (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 20/22] landlock: Add update and debug access flags (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 22/22] samples/landlock: Add sandbox example (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC PATCH v2 3/3] block: Always use a bounce buffer when XPFO
is enabled (Christoph Hellwig <hch@...radead.org>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (Jiri Slaby <jslaby@...e.cz>)
- Re: [PATCH v3 3/7] arm64: Introduce uaccess_{disable,enable}
functionality based on TTBR0_EL1 (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive
Page Frame Ownership (XPFO) (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive
Page Frame Ownership (XPFO) (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching (Ard Biesheuvel <ard.biesheuvel@...aro.org>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching (Ard Biesheuvel <ard.biesheuvel@...aro.org>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (One Thousand Gnomes <gnomes@...rguk.ukuu.org.uk>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Dave Hansen <dave.hansen@...el.com>)
- RE: [RFC v3 00/22] Landlock LSM: Unprivileged sandboxing (David Laight <David.Laight@...LAB.COM>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Juerg Haefliger <juerg.haefliger@....com>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Dave Hansen <dave.hansen@...el.com>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (Kees Cook <keescook@...omium.org>)
- Re: Re: [PATCH v3 3/7] arm64: Introduce
uaccess_{disable,enable} functionality based on TTBR0_EL1 (Kees Cook <keescook@...omium.org>)
- Re: [PATCH v3 4/7] arm64: Disable TTBR0_EL1 during normal kernel
execution (Will Deacon <will.deacon@....com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per
process hierarchy (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal
with (Landlock) handles (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Jann Horn <jann@...jh.net>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never
using TTBR0_EL1 switching (David Brown <david.brown@...aro.org>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 14/22] bpf/cgroup: Make cgroup_bpf_update() return an
error code (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the
Landlock context (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 22/22] samples/landlock: Add sandbox example (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 17/22] cgroup: Add access check for cgroup_get_from_fd() (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per
process hierarchy (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the
Landlock context (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with
(Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal
with (Landlock) handles (Alexei Starovoitov <alexei.starovoitov@...il.com>)
September 15 (29 messages)
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing (Pavel Machek <pavel@....cz>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never
using TTBR0_EL1 switching (Catalin Marinas <catalin.marinas@....com>)
- [RFC PATCH 0/8] arm64: move thread_info off of the task stack (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 1/8] thread_info: include <current.h> for THREAD_INFO_IN_TASK (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 2/8] thread_info: allow custom in-task thread_info (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 3/8] arm64: thread_info remove stale items (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 4/8] arm64: asm-offsets: remove unused definitions (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 5/8] arm64: assembler: introduce ldr_this_cpu (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 6/8] arm64: traps: use task_struct instead of thread_info (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 7/8] arm64: move sp_el0 and tpidr_el1 into cpu_suspend_ctx (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 8/8] arm64: split thread_info from task stack (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 1/7] arm64: Factor out PAN enabling/disabling into
separate uaccess_* macros (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 2/7] arm64: Factor out TTBR0_EL1 post-update
workaround into a specific asm macro (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH 2/8] thread_info: allow custom in-task thread_info (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with
(Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
September 16 (5 messages)
September 17 (1 message)
September 19 (9 messages)
September 20 (8 messages)
September 21 (6 messages)
September 22 (2 messages)
September 23 (4 messages)
September 24 (1 message)
September 26 (3 messages)
September 27 (6 messages)
September 29 (6 messages)
September 30 (13 messages)
213 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.