[<prev month] [next month>] [year] [list]
kernel-hardening mailing list - 2016/10
Messages by day:
October 3 (41 messages)
October 4 (14 messages)
October 5 (20 messages)
October 6 (18 messages)
October 7 (10 messages)
October 9 (4 messages)
October 10 (6 messages)
October 11 (4 messages)
October 12 (21 messages)
October 13 (9 messages)
October 14 (4 messages)
October 15 (2 messages)
October 16 (1 message)
October 17 (11 messages)
October 18 (29 messages)
October 19 (21 messages)
October 20 (22 messages)
October 21 (4 messages)
October 22 (2 messages)
October 24 (9 messages)
October 25 (21 messages)
October 26 (52 messages)
- Re: [PATCH] module: extend 'rodata=off' boot cmdline parameter to module mappings (Rusty Russell <rusty@...tcorp.com.au>)
- Re: [PATCH] module: extend 'rodata=off' boot
cmdline parameter to module mappings (AKASHI Takahiro <takahiro.akashi@...aro.org>)
- Re: [RFC v2 PATCH 12/13] x86: implementation for
HARDENED_ATOMIC (AKASHI Takahiro <takahiro.akashi@...aro.org>)
- Re: [RFC v2 PATCH 12/13] x86: implementation for HARDENED_ATOMIC (David Windsor <dwindsor@...il.com>)
- [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 04/18] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 06/18] fs: Constify path_is_under()'s arguments (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 01/18] landlock: Add Kconfig (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 05/18] bpf,landlock: Define an eBPF program type for Landlock (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 08/18] landlock: Handle file comparisons (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 09/18] landlock: Add manager functions (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 07/18] landlock: Add LSM hooks (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 10/18] seccomp: Split put_seccomp_filter() with put_seccomp() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 13/18] bpf/cgroup: Replace struct bpf_prog with struct bpf_object (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 11/18] seccomp,landlock: Handle Landlock hooks per process hierarchy (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 14/18] bpf/cgroup: Make cgroup_bpf_update() return an error code (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 12/18] bpf: Cosmetic change for bpf_prog_attach() (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 15/18] bpf/cgroup: Move capability check (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 17/18] landlock: Add update and debug access flags (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 18/18] samples/landlock: Add sandbox example (Mickaël Salaün <mic@...ikod.net>)
- [RFC v4 16/18] bpf/cgroup,landlock: Handle Landlock hooks per cgroup (Mickaël Salaün <mic@...ikod.net>)
- RE: fix typo __atomic_op_fence ("Reshetova, Elena" <elena.reshetova@...el.com>)
- Re: [RFC 2/2] arm: implementation for HARDENED_ATOMIC (AKASHI Takahiro <takahiro.akashi@...aro.org>)
- Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it (Arnd Bergmann <arnd@...db.de>)
- Re: [RFC v2 PATCH 01/13] Add architecture
independent hardened atomic base (AKASHI Takahiro <takahiro.akashi@...aro.org>)
- RE: [RFC v2 PATCH 13.1/13] lkdtm: add tests for atomic
over-/underflow ("Reshetova, Elena" <elena.reshetova@...el.com>)
- RE: [RFC v2 PATCH 00/13] HARDENED_ATOMIC ("Reshetova, Elena" <elena.reshetova@...el.com>)
- Re: [RFC 2/2] arm: implementation for HARDENED_ATOMIC (Colin Vidal <colin@...dal.org>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Colin Vidal <colin@...dal.org>)
- RE: [RFC v2 PATCH 00/13] HARDENED_ATOMIC ("Reshetova, Elena" <elena.reshetova@...el.com>)
- RE: [RFC v2 PATCH 01/13] Add architecture
independent hardened atomic base ("Reshetova, Elena" <elena.reshetova@...el.com>)
- RE: [RFC v2 PATCH 12/13] x86: implementation for
HARDENED_ATOMIC ("Reshetova, Elena" <elena.reshetova@...el.com>)
- Re: Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to
BPF headers and inline it (David Sterba <dave@...os.cz>)
- Breaking Kernel ASLR by using Intel TSX (Taesoo Kim <taesoo@...ech.edu>)
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing (Jann Horn <jann@...jh.net>)
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Colin Vidal <colin@...dal.org>)
- Re: [RFC v4 03/18] bpf,landlock: Add a new
arraymap type to deal with (Landlock) handles (Jann Horn <jann@...jh.net>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Colin Vidal <colin@...dal.org>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Kees Cook <keescook@...omium.org>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Kees Cook <keescook@...omium.org>)
- Re: [RFC v4 03/18] bpf,landlock: Add a new
arraymap type to deal with (Landlock) handles (Mickaël Salaün <mic@...ikod.net>)
- Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC (Colin Vidal <colin@...dal.org>)
- Re: [RFC v4 03/18] bpf,landlock: Add a new
arraymap type to deal with (Landlock) handles (Jann Horn <jann@...jh.net>)
- Re: [RFC v2 PATCH 13.1/13] lkdtm: add tests for atomic over-/underflow (Kees Cook <keescook@...omium.org>)
- Re: [RFC v2 PATCH 01/13] Add architecture
independent hardened atomic base (Kees Cook <keescook@...omium.org>)
- Re: [RFC v2 PATCH 12/13] x86: implementation for HARDENED_ATOMIC (Kees Cook <keescook@...omium.org>)
- Re: [RFC v2 PATCH 12/13] x86: implementation for HARDENED_ATOMIC (David Windsor <dwindsor@...il.com>)
- Re: [RFC v2 PATCH 12/13] x86: implementation for HARDENED_ATOMIC (Kees Cook <keescook@...omium.org>)
October 27 (25 messages)
October 28 (45 messages)
October 29 (26 messages)
October 30 (1 message)
October 31 (37 messages)
459 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.