messages from 2012-01-19 00:55:33 to 2012-02-27 20:49:10 UTC [more...]
[kernel-hardening] [PATCH v11 01/12] sk_run_filter: add support for custom load_pointer
2012-02-27 20:49 UTC (37+ messages)
` [kernel-hardening] [PATCH v11 02/12] net/compat.c,linux/filter.h: share compat_sock_fprog
` [kernel-hardening] [PATCH v11 03/12] seccomp: kill the seccomp_t typedef
` [kernel-hardening] [PATCH v11 04/12] asm/syscall.h: add syscall_get_arch
` [kernel-hardening] [PATCH v11 05/12] arch/x86: add syscall_get_arch to syscall.h
` [kernel-hardening] [PATCH v11 06/12] seccomp: add system call filtering using BPF
` [kernel-hardening] "
` [kernel-hardening] [PATCH v11 07/12] seccomp: add SECCOMP_RET_ERRNO
` [kernel-hardening] "
` [kernel-hardening] [PATCH v11 08/12] signal, x86: add SIGSYS info and make it synchronous
` [kernel-hardening] "
` [kernel-hardening] [PATCH v11 09/12] seccomp: Add SECCOMP_RET_TRAP
` [kernel-hardening] [PATCH v11 10/12] ptrace,seccomp: Add PTRACE_SECCOMP support
` [kernel-hardening] "
` [kernel-hardening] [PATCH v11 11/12] x86: Enable HAVE_ARCH_SECCOMP_FILTER
` [kernel-hardening] [PATCH v11 12/12] Documentation: prctl/seccomp_filter
[kernel-hardening] [PATCH v10 01/11] sk_run_filter: add support for custom load_pointer
2012-02-27 16:21 UTC (53+ messages)
` [kernel-hardening] [PATCH v10 02/11] seccomp: kill the seccomp_t typedef
` [kernel-hardening] [PATCH v10 03/11] asm/syscall.h: add syscall_get_arch
` [kernel-hardening] "
` [kernel-hardening] [PATCH v11 "
` [kernel-hardening] [PATCH v10 04/11] arch/x86: add syscall_get_arch to syscall.h
` [kernel-hardening] [PATCH v10 05/11] seccomp: add system call filtering using BPF
` [kernel-hardening] "
` [kernel-hardening] [PATCH v10 06/11] seccomp: add SECCOMP_RET_ERRNO
` [kernel-hardening] "
` [kernel-hardening] [PATCH v10 07/11] signal, x86: add SIGSYS info and make it synchronous
` [kernel-hardening] "
` [kernel-hardening] [PATCH v10 08/11] seccomp: Add SECCOMP_RET_TRAP
` [kernel-hardening] [PATCH v10 09/11] ptrace,seccomp: Add PTRACE_SECCOMP support
` [kernel-hardening] "
` [kernel-hardening] [PATCH v10 10/11] x86: Enable HAVE_ARCH_SECCOMP_FILTER
` [kernel-hardening] [PATCH v10 11/11] Documentation: prctl/seccomp_filter
` [kernel-hardening] "
[kernel-hardening] procfs: infoleaks and DAC permissions
2012-02-25 3:56 UTC (15+ messages)
[kernel-hardening] Add overflow protection to kref
2012-02-24 22:14 UTC (31+ messages)
` [kernel-hardening] "
` [kernel-hardening] Re: [ubuntu-hardened] "
[kernel-hardening] [PATCH] fs: hardlink creation restriction cleanup
2012-02-22 19:10 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v2] fs: hardlink creation restriction cleanup
2012-02-22 18:55 UTC
[kernel-hardening] [PATCH v2] fs: hardlink creation restrictions
2012-02-21 23:22 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] Gmane archive, RSS feeds
2012-02-21 17:56 UTC
[kernel-hardening] [PATCH] fs: hardlink creation restrictions
2012-02-20 8:22 UTC (6+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v2012.2] fs: symlink restrictions on sticky directories
2012-02-19 12:31 UTC (6+ messages)
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v8 1/8] sk_run_filter: add support for custom load_pointer
2012-02-17 4:51 UTC (36+ messages)
` [kernel-hardening] Re: [PATCH v8 5/8] seccomp: Add SECCOMP_RET_TRAP
` [kernel-hardening] [PATCH v9 "
` [kernel-hardening] [PATCH v9 8/8] Documentation: prctl/seccomp_filter
` [kernel-hardening] Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF
[kernel-hardening] [PATCH] Yama: add PR_SET_PTRACER_ANY
2012-02-15 23:41 UTC (2+ messages)
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v7 4/8] seccomp: Add SECCOMP_RET_TRAP
2012-02-11 20:33 UTC
[kernel-hardening] [PATCH v10 0/2] security: Yama LSM
2012-02-09 22:36 UTC (5+ messages)
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v3] sysctl: control functionality of /proc/pid/mem
2012-01-31 19:22 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).