[<prev day] [next day>] [month] [year] [list]
kernel-hardening mailing list - 2016/09/15
- Re: [RFC v3 19/22] landlock: Add interrupted origin (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Alexei Starovoitov <alexei.starovoitov@...il.com>)
- Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing (Pavel Machek <pavel@....cz>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never
using TTBR0_EL1 switching (Catalin Marinas <catalin.marinas@....com>)
- [RFC PATCH 0/8] arm64: move thread_info off of the task stack (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 1/8] thread_info: include <current.h> for THREAD_INFO_IN_TASK (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 2/8] thread_info: allow custom in-task thread_info (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 3/8] arm64: thread_info remove stale items (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 4/8] arm64: asm-offsets: remove unused definitions (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 5/8] arm64: assembler: introduce ldr_this_cpu (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 6/8] arm64: traps: use task_struct instead of thread_info (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 7/8] arm64: move sp_el0 and tpidr_el1 into cpu_suspend_ctx (Mark Rutland <mark.rutland@....com>)
- [RFC PATCH 8/8] arm64: split thread_info from task stack (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 1/7] arm64: Factor out PAN enabling/disabling into
separate uaccess_* macros (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 2/7] arm64: Factor out TTBR0_EL1 post-update
workaround into a specific asm macro (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1
switching (Mark Rutland <mark.rutland@....com>)
- Re: [RFC PATCH 2/8] thread_info: allow custom in-task thread_info (Andy Lutomirski <luto@...capital.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle
unprivileged hooks (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 07/22] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with
(Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
29 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.