messages from 2016-08-09 12:58:53 to 2016-08-27 18:32:52 UTC [more...]
[kernel-hardening] [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing
2016-08-27 18:32 UTC (37+ messages)
` [kernel-hardening] [RFC v2 01/10] landlock: Add Kconfig
` [kernel-hardening] [RFC v2 02/10] bpf: Move u64_to_ptr() to BPF headers and inline it
` [kernel-hardening] [RFC v2 03/10] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
` [kernel-hardening] [RFC v2 04/10] seccomp: Split put_seccomp_filter() with put_seccomp()
` [kernel-hardening] [RFC v2 05/10] seccomp: Handle Landlock
` [kernel-hardening] [RFC v2 06/10] landlock: Add LSM hooks
` [kernel-hardening] [RFC v2 07/10] landlock: Add errno check
` [kernel-hardening] "
` [kernel-hardening] [RFC v2 08/10] landlock: Handle file system comparisons
` [kernel-hardening] "
` [kernel-hardening] [RFC v2 09/10] landlock: Handle cgroups
` [kernel-hardening] "
` [kernel-hardening] Re: [RFC v2 09/10] landlock: Handle cgroups (performance)
` [kernel-hardening] Re: [RFC v2 09/10] landlock: Handle cgroups (netfilter match)
` [kernel-hardening] Re: [RFC v2 09/10] landlock: Handle cgroups (program types)
` [kernel-hardening] [RFC v2 10/10] samples/landlock: Add sandbox example
` [kernel-hardening] Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing
` [kernel-hardening] Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing (cgroup delegation)
[kernel-hardening] [PATCH] lib: harden strncpy_from_user
2016-08-26 18:57 UTC (2+ messages)
[kernel-hardening] [PATCH 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching
2016-08-26 17:24 UTC (37+ messages)
` [kernel-hardening] [PATCH 1/7] arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
` [kernel-hardening] [PATCH 2/7] arm64: Factor out TTBR0_EL1 setting into a specific asm macro
` [kernel-hardening] [PATCH 3/7] arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1
` [kernel-hardening] [PATCH 4/7] arm64: Disable TTBR0_EL1 during normal kernel execution
` [kernel-hardening] "
` [kernel-hardening] [PATCH 5/7] arm64: Handle faults caused by inadvertent user access with PAN enabled
` [kernel-hardening] [PATCH 6/7] arm64: xen: Enable user access before a privcmd hvc call
` [kernel-hardening] "
` [kernel-hardening] [PATCH 7/7] arm64: Enable CONFIG_ARM64_TTBR0_PAN
` [kernel-hardening] Re: [PATCH 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching
[kernel-hardening] [PATCH v1] kexec/arch/i386: Add support for KASLR memory randomization
2016-08-23 15:38 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v3 0/5] bug: Provide toggle for BUG on data corruption
2016-08-22 22:32 UTC (15+ messages)
` [kernel-hardening] [PATCH v3 1/5] list: Split list_add() debug checking into separate function
` [kernel-hardening] [PATCH v3 2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
` [kernel-hardening] [PATCH v3 3/5] list: Split list_del() debug checking into separate function
` [kernel-hardening] [PATCH v3 4/5] bug: Provide toggle for BUG on data corruption
` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 5/5] lkdtm: Add tests for struct list corruption
` [kernel-hardening] Re: [PATCH v3 0/5] bug: Provide toggle for BUG on data corruption
[kernel-hardening] [PATCH v1] kdump, vmcoreinfo: report memory sections virtual addresses
2016-08-19 18:01 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v2 0/5] bug: Provide toggle for BUG on data corruption
2016-08-17 21:11 UTC (14+ messages)
` [kernel-hardening] [PATCH v2 1/5] list: Split list_add() debug checking into separate function
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
` [kernel-hardening] [PATCH v2 3/5] list: Split list_del() debug checking into separate function
` [kernel-hardening] [PATCH v2 4/5] bug: Provide toggle for BUG on data corruption
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 5/5] lkdtm: Add tests for struct list corruption
` [kernel-hardening] Re: [PATCH v2 0/5] bug: Provide toggle for BUG on data corruption
[kernel-hardening] [PATCH 0/5] bug: Provide toggle for BUG on data corruption
2016-08-17 16:32 UTC (18+ messages)
` [kernel-hardening] [PATCH 1/5] list: Split list_add() debug checking into separate function
` [kernel-hardening] [PATCH 2/5] rculist: Consolidate DEBUG_LIST for list_add_rcu()
` [kernel-hardening] [PATCH 3/5] list: Split list_del() debug checking into separate function
` [kernel-hardening] [PATCH 4/5] bug: Provide toggle for BUG on data corruption
` [kernel-hardening] "
` [kernel-hardening] [PATCH 5/5] lkdtm: Add tests for struct list corruption
[kernel-hardening] [PATCH] [RFC] Introduce mmap randomization
2016-08-14 16:31 UTC (8+ messages)
` [kernel-hardening] "
` [kernel-hardening] "
[kernel-hardening] [PATCH v2] x86/power/64: Restore processor state before using per-cpu variables
2016-08-12 17:52 UTC
[kernel-hardening] [PATCH v1] x86/power/64: Restore processor state before using per-cpu variables
2016-08-12 17:45 UTC (9+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH 0/2] expand use of __ro_after_init
2016-08-12 16:24 UTC (17+ messages)
` [kernel-hardening] [PATCH 2/2] arm: apply more __ro_after_init
` [kernel-hardening] "
[kernel-hardening] [PATCH] mm: Add the ram_latent_entropy kernel parameter
2016-08-12 3:52 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [Resend][PATCH] x86/power/64: Always create temporary identity mapping correctly
2016-08-11 21:33 UTC (31+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
2016-08-09 17:11 UTC (2+ messages)
` [kernel-hardening] [PATCH v4 2/2] x86/KASLR: Increase BRK pages for "
[kernel-hardening] [PATCH v2 1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
2016-08-09 17:02 UTC (4+ messages)
` [kernel-hardening] [PATCH v2 2/2] x86/KASLR: Increase BRK pages for "
` [kernel-hardening] "
[kernel-hardening] [PATCH v3 1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
2016-08-09 16:51 UTC (2+ messages)
` [kernel-hardening] [PATCH v3 2/2] x86/KASLR: Increase BRK pages for "
[kernel-hardening] [PATCH v1 1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
2016-08-09 16:30 UTC (8+ messages)
` [kernel-hardening] [PATCH v1 2/2] x86/KASLR: Increase BRK pages for "
` [kernel-hardening] "
` [kernel-hardening] [lkp] [x86/KASLR] 20067c4c13: kernel BUG at arch/x86/mm/physaddr.c:26!
` [kernel-hardening] Re: [PATCH v1 1/2] x86/KASLR: Fix physical memory calculation on KASLR memory randomization
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).