All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2 0/2] um: Protect memory mapped file
@ 2015-11-29 14:03 ` Mickaël Salaün
  0 siblings, 0 replies; 16+ messages in thread
From: Mickaël Salaün @ 2015-11-29 14:03 UTC (permalink / raw)
  To: linux-kernel
  Cc: Mickaël Salaün, Jeff Dike, Richard Weinberger,
	Tristan Schmelcher, Greg Kroah-Hartman, user-mode-linux-devel,
	user-mode-linux-user

This series protect the memory mapped file.

Changes since v1; addressed Richard Weinberger's comments:
* add attacker model to the patch description [1/2]
* remove errno reset [2/2]

Regards,
 Mickaël

Mickaël Salaün (2):
  um: Set secure access mode for temporary file
  um: Use race-free temporary file creation

 arch/um/os-Linux/mem.c | 13 ++++++++++++-
 1 file changed, 12 insertions(+), 1 deletion(-)

-- 
2.6.2


^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2015-12-09 23:58 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-11-29 14:03 [PATCH v2 0/2] um: Protect memory mapped file Mickaël Salaün
2015-11-29 14:03 ` Mickaël Salaün
2015-11-29 14:03 ` [PATCH v2 1/2] um: Set secure access mode for temporary file Mickaël Salaün
2015-11-29 14:03   ` Mickaël Salaün
2015-12-04 17:13   ` Tristan Schmelcher
2015-12-06 11:32     ` Mickaël Salaün
2015-12-06 11:57       ` Mickaël Salaün
2015-12-06 14:43       ` Mickaël Salaün
2015-12-08 20:37         ` Tristan Schmelcher
2015-12-08 20:37           ` Tristan Schmelcher
2015-12-08 21:45           ` Richard Weinberger
2015-12-08 21:45             ` [uml-devel] " Richard Weinberger
2015-12-09 23:58             ` Mickaël Salaün
2015-11-29 14:03 ` [PATCH v2 2/2] um: Use race-free temporary file creation Mickaël Salaün
2015-11-29 14:03   ` Mickaël Salaün
2015-12-04 17:26   ` Tristan Schmelcher

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.