messages from 2016-02-26 00:36:41 to 2016-04-06 20:17:16 UTC [more...]
[kernel-hardening] [PATCH] Prefer kASLR over Hibernation
2016-04-06 20:17 UTC (2+ messages)
` [kernel-hardening] "
[kernel-hardening] [RFC v1] mm: SLAB freelist randomization
2016-04-06 19:35 UTC
[kernel-hardening] [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
2016-04-06 19:23 UTC (16+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v2 00/11] MIPS relocatable kernel & KASLR
2016-04-05 21:00 UTC (22+ messages)
` [kernel-hardening] [PATCH v2 01/11] MIPS: tools: Add relocs tool
` [kernel-hardening] [PATCH v2 02/11] MIPS: tools: Build "
` [kernel-hardening] [PATCH v2 03/11] MIPS: Reserve space for relocation table
` [kernel-hardening] [PATCH v2 04/11] MIPS: Generate relocation table when CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 05/11] MIPS: Kernel: Add relocate.c
` [kernel-hardening] [PATCH v2 06/11] MIPS: Call relocate_kernel if CONFIG_RELOCATABLE=y
` [kernel-hardening] [PATCH v2 07/11] MIPS: bootmem: When relocatable, free memory below kernel
` [kernel-hardening] [PATCH v2 08/11] MIPS: Add CONFIG_RELOCATABLE Kconfig option
` [kernel-hardening] [PATCH v2 09/11] MIPS: Introduce plat_get_fdt a platform API to retrieve the FDT
` [kernel-hardening] [PATCH v2 10/11] MIPS: Kernel: Implement KASLR using CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 11/11] MIPS: KASLR: Print relocation Information on boot
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v4 00/20] x86, boot: kaslr cleanup and 64bit kaslr support
2016-04-05 20:00 UTC
[kernel-hardening] [PATCH v5 0/5] Introduce GCC plugin infrastructure
2016-04-02 4:32 UTC (32+ messages)
` [kernel-hardening] [PATCH v5 1/5] Shared library support
` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/5] GCC plugin infrastructure
` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 3/5] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 4/5] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v5 5/5] Add sancov plugin
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
2016-04-01 12:57 UTC (27+ messages)
` [kernel-hardening] [PATCH v4 1/4] SROP Mitigation: Architecture independent code for signal cookies
` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/4] x86: SROP Mitigation: Implement Signal Cookies
` [kernel-hardening] [PATCH v4 3/4] Sysctl: SROP Mitigation: Add Sysctl argument to disable SROP
` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 4/4] Documentation: SROP Mitigation: Add documentation for SROP cookies
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
2016-03-29 19:07 UTC (31+ messages)
` [kernel-hardening] [RFC v1 01/17] um: Export the sys_call_table
` [kernel-hardening] [RFC v1 02/17] seccomp: Fix typo
` [kernel-hardening] [RFC v1 03/17] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
` [kernel-hardening] "
` [kernel-hardening] [PATCH 1/2] "
` [kernel-hardening] "
` [kernel-hardening] [RFC v1 04/17] selftest/seccomp: Fix the seccomp(2) signature
` [kernel-hardening] "
` [kernel-hardening] [PATCH 2/2] "
` [kernel-hardening] "
` [kernel-hardening] [RFC v1 05/17] security/seccomp: Add LSM and create arrays of syscall metadata
` [kernel-hardening] "
` [kernel-hardening] [RFC v1 06/17] seccomp: Add the SECCOMP_ADD_CHECKER_GROUP command
` [kernel-hardening] [RFC v1 07/17] seccomp: Add seccomp object checker evaluation
` [kernel-hardening] [RFC v1 08/17] selftest/seccomp: Remove unknown_ret_is_kill_above_allow test
` [kernel-hardening] [RFC v1 09/17] selftest/seccomp: Extend seccomp_data until matches[6]
` [kernel-hardening] [RFC v1 10/17] selftest/seccomp: Add field_is_valid_syscall test
` [kernel-hardening] [RFC v1 11/17] selftest/seccomp: Add argeval_open_whitelist test
` [kernel-hardening] [RFC v1 12/17] audit,seccomp: Extend audit with seccomp state
` [kernel-hardening] [RFC v1 13/17] selftest/seccomp: Rename TRACE_poke to TRACE_poke_sys_read
` [kernel-hardening] [RFC v1 14/17] selftest/seccomp: Make tracer_poke() more generic
` [kernel-hardening] [RFC v1 15/17] selftest/seccomp: Add argeval_toctou_argument test
` [kernel-hardening] [RFC v1 16/17] security/seccomp: Protect against filesystem TOCTOU
` [kernel-hardening] [RFC v1 17/17] selftest/seccomp: Add argeval_toctou_filesystem test
` [kernel-hardening] Re: [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
[kernel-hardening] [ANNOUNCE] Linux Security Summit 2016 - CFP
2016-03-24 22:55 UTC
[kernel-hardening] [CSW16] Getting Physical: Extreme Abuse of Intel Based Paging Systems
2016-03-23 12:32 UTC
[kernel-hardening] [PATCH] s390: disable postinit-readonly for now
2016-03-21 19:33 UTC (5+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies
2016-03-10 9:43 UTC (18+ messages)
` [kernel-hardening] [PATCH v3 2/3] x86: SROP mitigation: implement "
` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 3/3] SROP mitigation: Add sysctl to disable SROP protection
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies
[kernel-hardening] [PATCHv4 0/2] Sanitization of buddy pages
2016-03-09 21:00 UTC (7+ messages)
` [kernel-hardening] [PATCHv4 1/2] mm/page_poison.c: Enable PAGE_POISONING as a separate option
` [kernel-hardening] "
` [kernel-hardening] [PATCHv4 2/2] mm/page_poisoning.c: Allow for zero poisoning
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCHv4 0/2] Sanitization of buddy pages
[kernel-hardening] [RFC][PATCH] s390, postinit-readonly: implement post-init RO
2016-03-08 12:56 UTC (5+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v5 0/7] introduce post-init read-only memory
2016-03-08 0:23 UTC (5+ messages)
` [kernel-hardening] [PATCH v5 4/7] "
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 0/3] Introduce GCC plugin infrastructure
2016-03-02 21:33 UTC (13+ messages)
` [kernel-hardening] [PATCH v4 1/3] "
` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/3] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v4 3/3] Documentation for the GCC plugin infrastructure
` [kernel-hardening] Re: [PATCH v4 0/3] Introduce "
[kernel-hardening] [PULL] lkdtm update (next)
2016-03-02 0:53 UTC (2+ messages)
` [kernel-hardening] "
[kernel-hardening] [RFC 0/2] format_template attribute
2016-03-01 21:54 UTC (3+ messages)
[kernel-hardening] [PATCHv2] lkdtm: Add READ_AFTER_FREE test
2016-03-01 1:37 UTC (19+ messages)
` [kernel-hardening] "
[kernel-hardening] XPFO RFC
2016-02-26 23:19 UTC
[kernel-hardening] [PATCHv2 0/3] LKDTM use after free test updates
2016-02-26 22:57 UTC (7+ messages)
` [kernel-hardening] [PATCHv4 1/3] lkdtm: Add READ_AFTER_FREE test
` [kernel-hardening] [PATCH 2/3] lkdtm: Update WRITE_AFTER_FREE test
` [kernel-hardening] [PATCHv2 3/3] lkdtm: Add read/write after free tests for buddy memory
` [kernel-hardening] Re: [PATCHv2 0/3] LKDTM use after free test updates
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox