kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2016-12-22 16:36:47 to 2017-01-16 19:22:24 UTC [more...]

[kernel-hardening] [PATCH] gcc-plugins: Add structleak for more stack initialization
 2017-01-16 19:22 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/2] procfs/tasks: introduce per-task procfs hidepid= field
 2017-01-16 18:24 UTC  (5+ messages)
` [kernel-hardening] [PATCH v4 1/2] procfs: use an enum for possible hidepid values
` [kernel-hardening] [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
  ` [kernel-hardening] "

[kernel-hardening] [PATCH 0/4] make call_usermodehelper a bit more "safe"
 2017-01-16 16:51 UTC  (5+ messages)
` [kernel-hardening] [PATCH 1/3] kmod: make usermodehelper path a const string
` [kernel-hardening] [PATCH 2/3] Make static usermode helper binaries constant
` [kernel-hardening] [PATCH 3/3] Introduce STATIC_USERMODEHELPER to mediate call_usermodehelper()
` [kernel-hardening] Re: [PATCH 0/4] make call_usermodehelper a bit more "safe"

[kernel-hardening] [RFC PATCH 00/19] refcount_t API + usage
 2017-01-16 16:16 UTC  (46+ messages)
` [kernel-hardening] [RFC PATCH 01/19] Since we need to change the implementation, stop exposing internals. Provide kref_read() to read the current reference count; typically used for debug messages
  ` [kernel-hardening] "
` [kernel-hardening] [RFC PATCH 02/19] By general sentiment kref_sub() is a bad interface, make it go away
` [kernel-hardening] [RFC PATCH 03/19] For some obscure reason apparmor thinks its needs to locally implement kref primitives that already exist. Stop doing this
` [kernel-hardening] [RFC PATCH 04/19] Because home-rolling your own is _awesome_, stop doing it. Provide kref_put_lock(), just like kref_put_mutex() but for a spinlock
` [kernel-hardening] [RFC PATCH 05/19] Leak references by unbalanced get, instead of poking at kref implementation details
` [kernel-hardening] [RFC PATCH 06/19] Provide refcount_t, an atomic_t like primitive built just for refcounting
` [kernel-hardening] [RFC PATCH 07/19] mixed: kref fixes
` [kernel-hardening] [RFC PATCH 08/19] kernel, mm: convert from atomic_t to refcount_t
` [kernel-hardening] [RFC PATCH 09/19] net: "
` [kernel-hardening] [RFC PATCH 10/19] fs: "
` [kernel-hardening] [RFC PATCH 11/19] security: "
` [kernel-hardening] [RFC PATCH 12/19] sound: "
` [kernel-hardening] [RFC PATCH 13/19] ipc: covert "
` [kernel-hardening] [RFC PATCH 14/19] tools: convert "
` [kernel-hardening] [RFC PATCH 15/19] block: "
` [kernel-hardening] [RFC PATCH 16/19] drivers: net "
` [kernel-hardening] [RFC PATCH 17/19] drivers: misc "
` [kernel-hardening] [RFC PATCH 18/19] drivers: infiniband "

[kernel-hardening] Introduction
 2017-01-14 10:10 UTC  (14+ messages)

[kernel-hardening] [RFC] gcc-plugins: Add initial x86_64 kernexec plugin
 2017-01-14  0:17 UTC 

[kernel-hardening] [PATCH] gcc-plugins: consolidate on PASS_INFO macro
 2017-01-13 22:13 UTC 

[kernel-hardening] [PATCH] gcc-plugins: add PASS_INFO and build_const_char_string()
 2017-01-13 22:02 UTC 

[kernel-hardening] [PATCH v4 0/4] Introduce the initify gcc plugin
 2017-01-12 23:40 UTC  (11+ messages)
` [kernel-hardening] "

[kernel-hardening] Looking for something to WORK ON
 2017-01-12 16:19 UTC  (13+ messages)

[kernel-hardening] New to KSPP, would like to contribute
 2017-01-12 10:04 UTC  (7+ messages)

[kernel-hardening] [RFC] x86/mm/KASLR: Remap GDTs at fixed location
 2017-01-10 17:13 UTC  (39+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC] Use of SipHash and HalfSipHash for Hashtables and PRF
 2017-01-10 17:03 UTC 

[kernel-hardening] Re: Conversion from atomic_t to refcount_t: summary of issues
 2017-01-10 14:58 UTC  (11+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH] Allow userspace control of runtime disabling/enabling of driver probing
 2017-01-05  8:13 UTC  (16+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH] Allow userspace to request device probing even if defer_all_probes is true
 2017-01-04 20:06 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening] Security issues on ARM processor
 2017-01-03 22:38 UTC  (2+ messages)

[kernel-hardening] Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
 2016-12-28 10:04 UTC  (14+ messages)

[kernel-hardening] BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
 2016-12-23 21:18 UTC  (18+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v6 0/5] The SipHash Patchset
 2016-12-22 19:50 UTC  (18+ messages)
` [kernel-hardening] [PATCH v7 0/6] "
  ` [kernel-hardening] [PATCH v7 3/6] random: use SipHash in place of MD5
    ` [kernel-hardening] "

[kernel-hardening] [PATCH 1/2] random: use chacha20 for get_random_int/long
 2016-12-22 18:07 UTC  (2+ messages)
` [kernel-hardening] [PATCH 2/2] random: convert get_random_int/long into get_random_u32/u64


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).