messages from 2017-05-12 19:36:00 to 2017-05-28 08:12:49 UTC [more...]
[kernel-hardening] [PATCH v2 00/20] Introduce struct layout randomization plugin
2017-05-28 8:12 UTC (38+ messages)
` [kernel-hardening] [PATCH v2 01/20] NFS: Avoid cross-structure casting
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 02/20] gcc-plugins: Detail c-common.h location for GCC 4.6
` [kernel-hardening] [PATCH v2 03/20] compiler: Add __designated_init annotation
` [kernel-hardening] [PATCH v2 04/20] gcc-plugins: Add the randstruct plugin
` [kernel-hardening] [PATCH v2 05/20] randstruct: Whitelist struct security_hook_heads cast
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 06/20] randstruct: Whitelist UNIXCB cast
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 07/20] randstruct: Whitelist big_key path struct overloading
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 08/20] randstruct: Whitelist NIU struct page overloading
` [kernel-hardening] [PATCH v2 09/20] randstruct: Mark various structs for randomization
` [kernel-hardening] [PATCH v2 10/20] randstruct: opt-out externally exposed function pointer structs
` [kernel-hardening] [PATCH v2 11/20] randstruct: Disable randomization of ACPICA structs
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 12/20] sgi-xp: Use designated initializers
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 13/20] drm/amdgpu: "
` [kernel-hardening] [PATCH v2 14/20] drm/amd/powerplay: "
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 15/20] mtk-vcodec: "
` [kernel-hardening] [PATCH v2 16/20] ntfs: Use ERR_CAST() to avoid cross-structure cast
` [kernel-hardening] [PATCH v2 17/20] ocfs2: "
` [kernel-hardening] [PATCH v2 18/20] randstruct: Enable function pointer struct detection
` [kernel-hardening] [PATCH v2 19/20] [RFC] task_struct: Allow randomized layout
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 20/20] ACPICA: Use designated initializers
` [kernel-hardening] "
[kernel-hardening] [PATCH] LSM: Convert security_hook_heads into explicit array of struct list_head
2017-05-28 1:26 UTC (5+ messages)
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH 0/3] ipc subsystem refcounter conversions
2017-05-27 19:58 UTC
[kernel-hardening] Patch for random mac address
2017-05-26 14:41 UTC (14+ messages)
[kernel-hardening] [PATCH v4] add the option of fortified string.h functions
2017-05-26 9:54 UTC
[kernel-hardening] [PATCH v3] add the option of fortified string.h functions
2017-05-26 8:35 UTC (8+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH 00/31] Standardize doc formats - part 1
2017-05-24 20:18 UTC (4+ messages)
` [kernel-hardening] [PATCH 23/31] gcc-plugins.txt: standardize document format
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 next 0/3] modules: automatic module loading restrictions
2017-05-24 18:06 UTC (22+ messages)
` [kernel-hardening] [PATCH v4 next 1/3] modules:capabilities: allow __request_module() to take a capability argument
` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 next 2/3] modules:capabilities: automatic module loading restriction
` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 next 3/3] modules:capabilities: add a per-task modules auto-load mode
` [kernel-hardening] "
[kernel-hardening] [RFC v3]mm: ro protection for data allocated dynamically
2017-05-24 17:45 UTC (14+ messages)
` [kernel-hardening] [PATCH 1/1] Sealable memory support
` [kernel-hardening] [PATCH] LSM: Make security_hook_heads a local variable
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH 1/1] Sealable memory support
[kernel-hardening] [PATCH v2 0/5] stackprotector: ascii armor the stack canary
2017-05-24 16:35 UTC (12+ messages)
` [kernel-hardening] [PATCH 1/5] random,stackprotect: introduce get_random_canary function
` [kernel-hardening] "
` [kernel-hardening] [PATCH 2/5] fork,random: use get_random_canary to set tsk->stack_canary
` [kernel-hardening] "
` [kernel-hardening] [PATCH 3/5] x86: ascii armor the x86_64 boot init stack canary
` [kernel-hardening] "
` [kernel-hardening] [PATCH 4/5] arm64: ascii armor the arm64 "
` [kernel-hardening] "
` [kernel-hardening] [PATCH 5/5] sh64: ascii armor the sh64 "
` [kernel-hardening] "
[kernel-hardening] [PATCH 3.18 52/59] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bits on 64-bit platforms
2017-05-23 20:10 UTC
[kernel-hardening] [PATCH 4.4 094/103] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bits on 64-bit platforms
2017-05-23 20:10 UTC
[kernel-hardening] [PATCH 4.9 140/164] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bits on 64-bit platforms
2017-05-23 20:09 UTC
[kernel-hardening] [PATCH 4.11 161/197] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bits on 64-bit platforms
2017-05-23 20:08 UTC
[kernel-hardening] Re: arch: arm: bpf: Converting cBPF to eBPF for arm 32 bit
2017-05-23 19:32 UTC (19+ messages)
[kernel-hardening] [PATCH 0/2] powerpc: fortify support
2017-05-22 10:04 UTC (6+ messages)
` [kernel-hardening] [PATCH 1/2] powerpc: Don't fortify prom_init
` [kernel-hardening] [PATCH 2/2] powerpc: Make feature-fixup tests fortify-safe
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH 1/2] powerpc: Don't fortify prom_init
[kernel-hardening] [RFC 00/06] printk: add more new kernel pointer filter options
2017-05-19 20:25 UTC (11+ messages)
` [kernel-hardening] [RFC 1/6] lib: vsprintf: additional kernel pointer filtering options
` [kernel-hardening] "
` [kernel-hardening] [RFC 5/6] lib: vsprintf: Add "%paP", "%padP" options
` [kernel-hardening] "
` [kernel-hardening] Re: [RFC 00/06] printk: add more new kernel pointer filter options
` [kernel-hardening] "
[kernel-hardening] [PATCH v6 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-05-19 14:33 UTC (24+ messages)
` [kernel-hardening] [PATCH v6 2/2] "
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v6 0/2] "
[kernel-hardening] Re: RFC v2: post-init-read-only protection for data allocated dynamically
2017-05-19 10:51 UTC (8+ messages)
[kernel-hardening] [PATCH v8 3/5] rxrpc: check return value of skb_to_sgvec always
2017-05-16 22:11 UTC (7+ messages)
` [kernel-hardening] [PATCH v8 0/5] skb_to_sgvec hardening
` [kernel-hardening] [PATCH v8 1/5] skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow
` [kernel-hardening] Re: [PATCH v8 3/5] rxrpc: check return value of skb_to_sgvec always
` [kernel-hardening] Re: [PATCH v8 1/5] skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow
[kernel-hardening] Interested in Helping KSPP
2017-05-15 17:01 UTC (2+ messages)
[kernel-hardening] [PATCH] drivers/gpu/drm: constify several *max_ioctl variables
2017-05-14 9:33 UTC (2+ messages)
` [kernel-hardening] [PATCH] drivers/media: improve the return type of a bunch of .get_frontend_algo callbacks
[kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
2017-05-13 7:21 UTC (24+ messages)
[kernel-hardening] [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
2017-05-12 23:20 UTC (15+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH 00/18] Introduce struct layout randomization plugin
2017-05-12 19:36 UTC (7+ messages)
` [kernel-hardening] [PATCH 01/18] gcc-plugins: Add the randstruct plugin
` [kernel-hardening] "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).