kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2020-10-13 00:34:25 to 2020-11-12 20:52:51 UTC [more...]

[PATCH v24 00/12] Landlock LSM
 2020-11-12 20:51 UTC  (5+ messages)
` [PATCH v24 01/12] landlock: Add object management
` [PATCH v24 02/12] landlock: Add ruleset and domain management
` [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v24 04/12] landlock: Add ptrace restrictions

[PATCH v2 0/8] Fork brute force attack mitigation
 2020-11-11  0:10 UTC  (14+ messages)
` [PATCH v2 1/8] security: Add LSM hook at the point where a task gets a fatal signal
` [PATCH v2 2/8] security/brute: Define a LSM and manage statistical data
` [PATCH v2 3/8] security/brute: Add sysctl attributes to allow detection fine tuning
` [PATCH v2 4/8] security/brute: Detect a fork brute force attack
` [PATCH v2 5/8] security/brute: Mitigate "
` [PATCH v2 6/8] security/brute: Add prctls to enable/disable the fork attack detection
` [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
` [PATCH v2 8/8] MAINTAINERS: Add a new entry "

[PATCH v6 00/25] Add support for Clang LTO
 2020-11-10 18:59 UTC  (53+ messages)
` [PATCH v6 02/25] objtool: Add a pass for generating __mcount_loc
` [PATCH v6 07/25] treewide: remove DISABLE_LTO
` [PATCH v6 13/25] kbuild: lto: merge module sections
` [PATCH v6 14/25] kbuild: lto: remove duplicate dependencies from .mod files
` [PATCH v6 15/25] init: lto: ensure initcall ordering
` [PATCH v6 16/25] init: lto: fix PREL32 relocations
` [PATCH v6 17/25] PCI: Fix PREL32 relocations for LTO
` [PATCH v6 18/25] modpost: lto: strip .lto from module names
` [PATCH v6 19/25] scripts/mod: disable LTO for empty.c
` [PATCH v6 20/25] efi/libstub: disable LTO
` [PATCH v6 21/25] drivers/misc/lkdtm: disable LTO for rodata.o
` [PATCH v6 22/25] x86/asm: annotate indirect jumps
` [PATCH v6 23/25] x86, vdso: disable LTO only for vDSO
` [PATCH v6 24/25] x86, cpu: disable LTO for cpu.c
` [PATCH v6 25/25] x86, build: allow LTO_CLANG and THINLTO to be selected

[PATCH v23 00/12] Landlock LSM
 2020-11-10  8:16 UTC  (15+ messages)
` [PATCH v23 01/12] landlock: Add object management
` [PATCH v23 02/12] landlock: Add ruleset and domain management
` [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v23 04/12] landlock: Add ptrace restrictions
` [PATCH v23 05/12] LSM: Infrastructure management of the superblock
` [PATCH v23 06/12] fs,security: Add sb_delete hook
` [PATCH v23 07/12] landlock: Support filesystem access-control
` [PATCH v23 08/12] landlock: Add syscall implementations
` [PATCH v23 09/12] arch: Wire up Landlock syscalls
` [PATCH v23 10/12] selftests/landlock: Add user space tests
` [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v23 12/12] landlock: Add user and kernel documentation

[PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
 2020-11-05 19:37 UTC  (17+ messages)

[PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
 2020-11-05 11:31 UTC  (28+ messages)
` [PATCH 1/4] elf: Pass the fd to note processing "
` [PATCH 2/4] elf: Move note processing after l_phdr is updated "
` [PATCH 3/4] aarch64: Use mmap to add PROT_BTI instead of mprotect "
` [PATCH 4/4] aarch64: Remove the bti link_map field "

[RFC PATCH v1 0/4] Per user namespace rlimits
 2020-11-04 16:21 UTC  (12+ messages)
` [RFC PATCH v1 1/4] Increase size of ucounts to atomic_long_t
` [RFC PATCH v1 2/4] Move the user's process counter to ucounts
` [RFC PATCH v1 3/4] Do not allow fork if RLIMIT_NPROC is exceeded in the user namespace tree
` [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted

[PATCH v22 00/12] Landlock LSM
 2020-11-03 16:03 UTC  (35+ messages)
` [PATCH v22 01/12] landlock: Add object management
` [PATCH v22 02/12] landlock: Add ruleset and domain management
` [PATCH v22 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v22 04/12] landlock: Add ptrace restrictions
` [PATCH v22 05/12] LSM: Infrastructure management of the superblock
` [PATCH v22 06/12] fs,security: Add sb_delete hook
` [PATCH v22 07/12] landlock: Support filesystem access-control
` [PATCH v22 08/12] landlock: Add syscall implementations
` [PATCH v22 09/12] arch: Wire up Landlock syscalls
` [PATCH v22 10/12] selftests/landlock: Add user space tests
` [PATCH v22 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v22 12/12] landlock: Add user and kernel documentation

[RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2020-10-27 17:19 UTC  (6+ messages)
` [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
` [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
 2020-10-26 16:51 UTC  (12+ messages)

[PATCH v21 00/12] Landlock LSM
 2020-10-15 12:31 UTC  (8+ messages)
` [PATCH v21 07/12] landlock: Support filesystem access-control
` [PATCH v21 12/12] landlock: Add user and kernel documentation

Remove all strlcpy() uses in favor of strscpy() (#89)
 2020-10-13 18:32 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).