messages from 2017-05-28 04:55:22 to 2017-06-05 00:12:25 UTC [more...]
[kernel-hardening] Stop the plagiarism
2017-06-05 0:12 UTC (16+ messages)
[kernel-hardening] [PATCH v1 1/1] Add Trusted Path Execution as a stackable LSM
2017-06-04 22:07 UTC (17+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v7 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-06-04 6:29 UTC (53+ messages)
` [kernel-hardening] [PATCH v7 1/2] security: tty: Add owner user namespace to tty_struct
` [kernel-hardening] [PATCH v7 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
` [kernel-hardening] "
[kernel-hardening] get_random_bytes returns bad randomness before seeding is complete
2017-06-04 6:23 UTC (24+ messages)
` [kernel-hardening] "
` [kernel-hardening] [PATCH RFC 0/3] get_random_bytes seed blocking
` [kernel-hardening] [PATCH RFC 1/3] random: add synchronous API for the urandom pool
` [kernel-hardening] [PATCH RFC 2/3] random: add get_random_{bytes,u32,u64,int,long}_wait family
` [kernel-hardening] [PATCH RFC 3/3] random: warn when kernel uses unseeded randomness
[kernel-hardening] [RFC v3]mm: ro protection for data allocated dynamically
2017-06-04 2:18 UTC (13+ messages)
` [kernel-hardening] [PATCH 1/1] Sealable memory support
` [kernel-hardening] "
[kernel-hardening] [PATCH net-next v10 0/5] Avoiding stack overflow in skb_to_sgvec
2017-06-04 2:16 UTC (6+ messages)
` [kernel-hardening] [PATCH net-next v10 1/5] skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow
` [kernel-hardening] [PATCH net-next v10 2/5] ipsec: check return value of skb_to_sgvec always
` [kernel-hardening] [PATCH net-next v10 3/5] rxrpc: "
` [kernel-hardening] [PATCH net-next v10 4/5] macsec: "
` [kernel-hardening] [PATCH net-next v10 5/5] virtio_net: "
[kernel-hardening] [PATCH 0/6] move mmap_area and PIE binaries away from the stack
2017-06-03 12:16 UTC (14+ messages)
` [kernel-hardening] [PATCH 1/6] binfmt_elf: document load_bias a little bit
` [kernel-hardening] [PATCH 2/6] x86/elf: move 32 bit ELF_ET_DYN_BASE to 256MB
` [kernel-hardening] "
` [kernel-hardening] [PATCH 3/6] x86/mmap: properly account for stack randomization in mmap_base
` [kernel-hardening] [PATCH 4/6] arm64/mmap: "
` [kernel-hardening] [PATCH 5/6] arm64: move COMPAT_ELF_ET_DYN_BASE lower in the address space
` [kernel-hardening] [PATCH 6/6] powerpc,mmap: properly account for stack randomization in mmap_base
[kernel-hardening] [PATCH v4] add the option of fortified string.h functions
2017-06-03 5:07 UTC (4+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 next 0/3] modules: automatic module loading restrictions
2017-06-01 19:10 UTC (9+ messages)
` [kernel-hardening] [PATCH v4 next 1/3] modules:capabilities: allow __request_module() to take a capability argument
` [kernel-hardening] "
[kernel-hardening] [PATCH v5 0/3] Implement fast refcount overflow protection
2017-06-01 14:43 UTC (13+ messages)
` [kernel-hardening] [PATCH v5 1/3] refcount: Create unchecked atomic_t implementation
` [kernel-hardening] "
` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/3] x86/asm: Add suffix macro for GEN_*_RMWcc()
` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 3/3] x86/refcount: Implement fast refcount overflow protection
` [kernel-hardening] Re: [PATCH v5 0/3] "
[kernel-hardening] [PATCH] LSM: Convert security_hook_heads into explicit array of struct list_head
2017-05-31 22:56 UTC (21+ messages)
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2] "
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v6 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-05-31 15:32 UTC (17+ messages)
[kernel-hardening] [PATCH v2 00/20] Introduce struct layout randomization plugin
2017-05-30 10:34 UTC (23+ messages)
` [kernel-hardening] [PATCH v2 01/20] NFS: Avoid cross-structure casting
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 05/20] randstruct: Whitelist struct security_hook_heads cast
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 06/20] randstruct: Whitelist UNIXCB cast
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 07/20] randstruct: Whitelist big_key path struct overloading
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 08/20] randstruct: Whitelist NIU struct page overloading
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 11/20] randstruct: Disable randomization of ACPICA structs
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 20/20] ACPICA: Use designated initializers
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH 0/3] ipc subsystem refcounter conversions
2017-05-29 15:43 UTC (10+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).