messages from 2017-12-11 12:08:46 to 2018-01-11 02:02:39 UTC [more...]
[kernel-hardening] [PATCH v5 00/38] Hardened usercopy whitelisting
2018-01-11 2:02 UTC (8+ messages)
` [kernel-hardening] [PATCH 01/38] usercopy: Remove pointer from overflow report
` [kernel-hardening] [PATCH 02/38] usercopy: Enhance and rename report_usercopy()
` [kernel-hardening] [PATCH 03/38] usercopy: Include offset in hardened usercopy report
` [kernel-hardening] [PATCH 04/38] lkdtm/usercopy: Adjust test to include an offset to check reporting
` [kernel-hardening] [PATCH 05/38] stddef.h: Introduce sizeof_field()
` [kernel-hardening] [PATCH 06/38] usercopy: Prepare for usercopy whitelisting
` [kernel-hardening] [PATCH 07/38] usercopy: WARN() on slab cache usercopy region violations
[kernel-hardening] [PATCH v4 00/36] Hardened usercopy whitelisting
2018-01-10 21:15 UTC (44+ messages)
` [kernel-hardening] [PATCH 01/36] usercopy: Remove pointer from overflow report
` [kernel-hardening] [PATCH 02/36] usercopy: Include offset in "
` [kernel-hardening] "
` [kernel-hardening] [PATCH 03/36] lkdtm/usercopy: Adjust test to include an offset to check reporting
` [kernel-hardening] [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
` [kernel-hardening] "
` [kernel-hardening] [PATCH 05/36] usercopy: WARN() on slab cache usercopy region violations
` [kernel-hardening] "
` [kernel-hardening] [PATCH 06/36] usercopy: Mark kmalloc caches as usercopy caches
` [kernel-hardening] [PATCH 07/36] dcache: Define usercopy region in dentry_cache slab cache
` [kernel-hardening] [PATCH 08/36] vfs: Define usercopy region in names_cache slab caches
` [kernel-hardening] [PATCH 09/36] vfs: Copy struct mount.mnt_id to userspace using put_user()
` [kernel-hardening] [PATCH 10/36] ext4: Define usercopy region in ext4_inode_cache slab cache
` [kernel-hardening] [PATCH 11/36] ext2: Define usercopy region in ext2_inode_cache "
` [kernel-hardening] [PATCH 12/36] jfs: Define usercopy region in jfs_ip "
` [kernel-hardening] [PATCH 13/36] befs: Define usercopy region in befs_inode_cache "
` [kernel-hardening] "
` [kernel-hardening] [PATCH 14/36] exofs: Define usercopy region in exofs_inode_cache "
` [kernel-hardening] [PATCH 15/36] orangefs: Define usercopy region in orangefs_inode_cache "
` [kernel-hardening] [PATCH 16/36] ufs: Define usercopy region in ufs_inode_cache "
` [kernel-hardening] [PATCH 17/36] vxfs: Define usercopy region in vxfs_inode "
` [kernel-hardening] [PATCH 18/36] cifs: Define usercopy region in cifs_request "
` [kernel-hardening] [PATCH 19/36] scsi: Define usercopy region in scsi_sense_cache "
` [kernel-hardening] [PATCH 20/36] net: Define usercopy region in struct proto "
` [kernel-hardening] [PATCH 21/36] ip: Define usercopy region in IP "
` [kernel-hardening] [PATCH 22/36] caif: Define usercopy region in caif "
` [kernel-hardening] [PATCH 23/36] sctp: Define usercopy region in SCTP "
` [kernel-hardening] [PATCH 24/36] sctp: Copy struct sctp_sock.autoclose to userspace using put_user()
` [kernel-hardening] [PATCH 25/36] net: Restrict unwhitelisted proto caches to size 0
` [kernel-hardening] [PATCH 26/36] fork: Define usercopy region in mm_struct slab caches
` [kernel-hardening] [PATCH 27/36] fork: Define usercopy region in thread_stack "
` [kernel-hardening] [PATCH 28/36] fork: Provide usercopy whitelisting for task_struct
` [kernel-hardening] [PATCH 29/36] x86: Implement thread_struct whitelist for hardened usercopy
` [kernel-hardening] [PATCH 30/36] arm64: "
` [kernel-hardening] [PATCH 31/36] arm: "
` [kernel-hardening] [PATCH 32/36] kvm: whitelist struct kvm_vcpu_arch
` [kernel-hardening] [PATCH 33/36] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl
` [kernel-hardening] [PATCH 34/36] usercopy: Allow strict enforcement of whitelists
` [kernel-hardening] [PATCH 35/36] usercopy: Restrict non-usercopy caches to size 0
` [kernel-hardening] [PATCH 36/36] lkdtm: Update usercopy tests for whitelisting
[kernel-hardening] [PATCHv3 0/2] capability controlled user-namespaces
2018-01-10 2:08 UTC (19+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH 0/3] exec: Pin stack limit during exec
2018-01-09 20:23 UTC (4+ messages)
` [kernel-hardening] [PATCH 1/3] exec: Pass stack rlimit into mm layout functions
` [kernel-hardening] [PATCH 2/3] exec: Introduce finalize_exec() before start_thread()
` [kernel-hardening] [PATCH 3/3] exec: Pin stack limit during exec
[kernel-hardening] [PATCH] leaking_addresses: add files to skip
2018-01-06 1:37 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v5] leaking_addresses: add generic 32-bit support
2018-01-05 22:12 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v2] arm: Always use REFCOUNT_FULL
2018-01-05 9:02 UTC
[kernel-hardening] [PATCH] arm: Always use REFCOUNT_FULL
2018-01-04 18:47 UTC (5+ messages)
[kernel-hardening] [PATCHv4 0/2] capability controlled user-namespaces
2018-01-04 5:53 UTC (3+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH 0/5] RFC: Public key encryption of dmesg by the kernel
2018-01-03 20:45 UTC (15+ messages)
` [kernel-hardening] [PATCH 1/5] crypto: fix memory leak in rsa-kcs1pad encryption
` [kernel-hardening] [PATCH 2/5] certs: allow in-kernel access of trusted keys
` [kernel-hardening] "
` [kernel-hardening] [PATCH 3/5] kernel/printk: allow kmsg to be encrypted using public key encryption
` [kernel-hardening] "
` [kernel-hardening] [PATCH 4/5] tools: add dmesg decryption program
` [kernel-hardening] "
` [kernel-hardening] [PATCH 5/5] docs: add dmesg encryption doc
` [kernel-hardening] "
[kernel-hardening] [PATCH 4.9 04/39] KAISER: Kernel Address Isolation
2018-01-03 20:11 UTC
[kernel-hardening] [PATCH 4.4 02/37] KAISER: Kernel Address Isolation
2018-01-03 20:11 UTC
[kernel-hardening] [PATCHv4 1/2] capability: introduce sysctl for controlled user-ns capability whitelist
2018-01-03 14:28 UTC (2+ messages)
[kernel-hardening] [PATCH] arm: kernel: implement fast refcount checking
2018-01-03 13:57 UTC (5+ messages)
[kernel-hardening] [PATCHv4 2/2] userns: control capabilities of some user namespaces
2018-01-03 7:26 UTC
[kernel-hardening] [PATCHv3 1/2] capability: introduce sysctl for controlled user-ns capability whitelist
2018-01-03 1:39 UTC (4+ messages)
` [kernel-hardening] Re: [PATCHv3, "
` [kernel-hardening] Re: [PATCHv3 "
[kernel-hardening] [PATCH] leaking_addresses: add generic 32-bit support
2017-12-30 10:30 UTC (5+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v4 0/3] doc: update printk documentation
2017-12-21 22:04 UTC (10+ messages)
` [kernel-hardening] [PATCH v4 1/3] doc: convert printk-formats.txt to rst
` [kernel-hardening] [PATCH v4 2/3] doc: update kptr_restrict documentation
` [kernel-hardening] [PATCH v4 3/3] doc: add documentation on printing kernel addresses
` [kernel-hardening] Re: [PATCH v4 0/3] doc: update printk documentation
[kernel-hardening] [PATCH 0/3] kallsyms: don't leak address
2017-12-19 23:39 UTC (24+ messages)
` [kernel-hardening] [PATCH 1/3] kallsyms: don't leak address when symbol not found
` [kernel-hardening] "
` [kernel-hardening] [PATCH 2/3] vsprintf: print <no-symbol> if "
` [kernel-hardening] "
` [kernel-hardening] [PATCH 3/3] trace: print address "
` [kernel-hardening] "
[kernel-hardening] [PATCH] Provide useful debugging information for VM_BUG
2017-12-19 23:01 UTC (4+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v3 0/3] kallsyms: don't leak address
2017-12-19 21:39 UTC (4+ messages)
` [kernel-hardening] [PATCH v3 1/3] kallsyms: don't leak address when symbol not found
` [kernel-hardening] [PATCH v3 2/3] vsprintf: print <symbol not found> if "
` [kernel-hardening] [PATCH v3 3/3] trace: print address "
[kernel-hardening] [PATCH] Kconfig: Make STRICT_DEVMEM default-y on x86 and arm64
2017-12-19 13:33 UTC (2+ messages)
[kernel-hardening] [PATCH v2 0/3] kallsyms: don't leak address
2017-12-19 6:33 UTC (6+ messages)
` [kernel-hardening] [PATCH v2 1/3] kallsyms: don't leak address when symbol not found
` [kernel-hardening] [PATCH v2 2/3] vsprintf: print <no-symbol> if "
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 3/3] trace: print address "
[kernel-hardening] [PATCH v3 0/3] doc: update printk documentation
2017-12-19 0:28 UTC (6+ messages)
` [kernel-hardening] [PATCH v3 1/3] doc: convert printk-formats.txt to rst
` [kernel-hardening] [PATCH v3 2/3] doc: update kpt_restrict documentation
` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 3/3] doc: add documentation on printing kernel addresses
[kernel-hardening] [RFC PATCH 0/1] genalloc: track beginning of allocations
2017-12-18 21:33 UTC (2+ messages)
` [kernel-hardening] [PATCH 1/1] "
[kernel-hardening] [PATCH v2 0/3] doc: update printk documentation
2017-12-18 2:48 UTC (7+ messages)
` [kernel-hardening] [PATCH v2 1/3] doc: convert printk-formats.txt to rst
` [kernel-hardening] [PATCH v2 2/3] doc: update kpt_restrict documentation
` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 3/3] doc: add documentation on printing kernel addresses
` [kernel-hardening] Re: [PATCH v2 0/3] doc: update printk documentation
[kernel-hardening] [PATCH RFC v6 2/6] gcc-plugins: Add STACKLEAK plugin for tracking the kernel stack
2017-12-15 15:28 UTC (3+ messages)
[kernel-hardening] Long live %pK (was Re: [PATCH tip/core/rcu 02/20] torture: Prepare scripting for shift from %p to %pK)
2017-12-13 18:21 UTC (4+ messages)
` [kernel-hardening] "
[kernel-hardening] [PATCH v3 0/2] Restrict dangerous open in sticky directories
2017-12-12 18:01 UTC (23+ messages)
` [kernel-hardening] [PATCH v3 2/2] Protected O_CREAT "
` [kernel-hardening] "
` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v3 0/2] Restrict dangerous "
[kernel-hardening] [PATCH RFC v6 0/6] Introduce the STACKLEAK feature and a test for it
2017-12-11 22:38 UTC (4+ messages)
` [kernel-hardening] [PATCH RFC v6 3/6] x86/entry: Erase kernel stack in syscall_trace_enter()
[kernel-hardening][PATCH] arm: hw_breakpoint: Mark variables as __ro_after_init
2017-12-11 19:24 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).