[<prev day] [next day>] [month] [year] [list]
kernel-hardening mailing list - 2016/09/14
- [RFC PATCH v2 0/3] Add support for eXclusive Page Frame Ownership (XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 1/3] Add support for eXclusive Page Frame Ownership (XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 2/3] xpfo: Only put previous userspace pages into the hot cache (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC PATCH v2 3/3] block: Always use a bounce buffer when XPFO is enabled (Juerg Haefliger <juerg.haefliger@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive Page Frame Ownership
(XPFO) (Juerg Haefliger <juerg.haefliger@....com>)
- [RFC v3 04/22] bpf: Set register type according to is_valid_access() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 01/22] landlock: Add Kconfig (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 02/22] bpf: Move u64_to_ptr() to BPF headers and inline it (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 05/22] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 09/22] seccomp: Move struct seccomp_filter in seccomp.h (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 08/22] seccomp: Fix documentation for struct seccomp_filter (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 00/22] Landlock LSM: Unprivileged sandboxing (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 06/22] landlock: Add LSM hooks (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 10/22] seccomp: Split put_seccomp_filter() with put_seccomp() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 15/22] bpf/cgroup: Move capability check (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 14/22] bpf/cgroup: Make cgroup_bpf_update() return an error code (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 12/22] bpf: Cosmetic change for bpf_prog_attach() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 13/22] bpf/cgroup: Replace struct bpf_prog with union bpf_object (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 17/22] cgroup: Add access check for cgroup_get_from_fd() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per process hierarchy (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the Landlock context (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 19/22] landlock: Add interrupted origin (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 20/22] landlock: Add update and debug access flags (Mickaël Salaün <mic@...ikod.net>)
- [RFC v3 22/22] samples/landlock: Add sandbox example (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC PATCH v2 3/3] block: Always use a bounce buffer when XPFO
is enabled (Christoph Hellwig <hch@...radead.org>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (Jiri Slaby <jslaby@...e.cz>)
- Re: [PATCH v3 3/7] arm64: Introduce uaccess_{disable,enable}
functionality based on TTBR0_EL1 (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive
Page Frame Ownership (XPFO) (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH v2 0/3] Add support for eXclusive
Page Frame Ownership (XPFO) (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching (Ard Biesheuvel <ard.biesheuvel@...aro.org>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching (Ard Biesheuvel <ard.biesheuvel@...aro.org>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (One Thousand Gnomes <gnomes@...rguk.ukuu.org.uk>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Dave Hansen <dave.hansen@...el.com>)
- RE: [RFC v3 00/22] Landlock LSM: Unprivileged sandboxing (David Laight <David.Laight@...LAB.COM>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Juerg Haefliger <juerg.haefliger@....com>)
- Re: [RFC PATCH v2 2/3] xpfo: Only put previous
userspace pages into the hot cache (Dave Hansen <dave.hansen@...el.com>)
- Re: [PATCH] pty: make ptmx file ops read-only after init (Kees Cook <keescook@...omium.org>)
- Re: Re: [PATCH v3 3/7] arm64: Introduce
uaccess_{disable,enable} functionality based on TTBR0_EL1 (Kees Cook <keescook@...omium.org>)
- Re: [PATCH v3 4/7] arm64: Disable TTBR0_EL1 during normal kernel
execution (Will Deacon <will.deacon@....com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per
process hierarchy (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal
with (Landlock) handles (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Jann Horn <jann@...jh.net>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never
using TTBR0_EL1 switching (David Brown <david.brown@...aro.org>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 14/22] bpf/cgroup: Make cgroup_bpf_update() return an
error code (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the
Landlock context (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 22/22] samples/landlock: Add sandbox example (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 17/22] cgroup: Add access check for cgroup_get_from_fd() (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per
process hierarchy (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 21/22] bpf,landlock: Add optional skb pointer in the
Landlock context (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with
(Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal
with (Landlock) handles (Alexei Starovoitov <alexei.starovoitov@...il.com>)
66 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.