kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2021-03-16 20:37:04 to 2021-04-07 16:08:27 UTC [more...]

[PATCH v33 00/12] Landlock LSM
 2021-04-07 16:07 UTC  (12+ messages)
` [PATCH v33 01/12] landlock: Add object management
` [PATCH v33 02/12] landlock: Add ruleset and domain management
` [PATCH v33 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v33 04/12] landlock: Add ptrace restrictions
` [PATCH v33 05/12] LSM: Infrastructure management of the superblock
` [PATCH v33 06/12] fs,security: Add sb_delete hook
` [PATCH v33 07/12] landlock: Support filesystem access-control
` [PATCH v33 08/12] landlock: Add syscall implementations
` [PATCH v33 09/12] arch: Wire up Landlock syscalls
` [PATCH v33 10/12] selftests/landlock: Add user space tests
` [PATCH v33 11/12] samples/landlock: Add a sandbox manager example

[PATCH v9 0/8] Count rlimits in each user namespace
 2021-04-06 15:44 UTC  (14+ messages)
` [PATCH v9 1/8] Increase size of ucounts to atomic_long_t
` [PATCH v9 2/8] Add a reference to ucounts for each cred
` [PATCH v9 3/8] Use atomic_t for ucounts reference counting
` [PATCH v9 4/8] Reimplement RLIMIT_NPROC on top of ucounts
` [PATCH v9 5/8] Reimplement RLIMIT_MSGQUEUE "
` [PATCH v9 6/8] Reimplement RLIMIT_SIGPENDING "
` [PATCH v9 7/8] Reimplement RLIMIT_MEMLOCK "
` [PATCH v9 8/8] kselftests: Add test to check for rlimit changes in different user namespaces

[PATCH v8 0/6] Optionally randomize kernel stack offset each syscall
 2021-04-01 20:59 UTC  (2+ messages)

[PATCH v10 0/6] Optionally randomize kernel stack offset each syscall
 2021-04-01 23:23 UTC  (7+ messages)
` [PATCH v10 1/6] jump_label: Provide CONFIG-driven build state defaults
` [PATCH v10 2/6] init_on_alloc: Optimize static branches
` [PATCH v10 3/6] stack: Optionally randomize kernel stack offset each syscall
` [PATCH v10 4/6] x86/entry: Enable random_kstack_offset support
` [PATCH v10 5/6] arm64: entry: "
` [PATCH v10 6/6] lkdtm: Add REPORT_STACK for checking stack offsets

[PATCH v8 0/6] Optionally randomize kernel stack offset each syscall
 2021-04-01 22:42 UTC  (19+ messages)
` [PATCH v8 1/6] jump_label: Provide CONFIG-driven build state defaults
` [PATCH v8 2/6] init_on_alloc: Optimize static branches
` [PATCH v8 3/6] stack: Optionally randomize kernel stack offset each syscall
` [PATCH v8 4/6] x86/entry: Enable random_kstack_offset support
` [PATCH v8 5/6] arm64: entry: "
` [PATCH v8 6/6] lkdtm: Add REPORT_STACK for checking stack offsets
` [PATCH] Where we are for this patch?

[PATCH v32 00/12] Landlock LSM
 2021-04-01 20:52 UTC  (13+ messages)
` [PATCH v32 01/12] landlock: Add object management
` [PATCH v32 02/12] landlock: Add ruleset and domain management
` [PATCH v32 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v32 04/12] landlock: Add ptrace restrictions
` [PATCH v32 05/12] LSM: Infrastructure management of the superblock
` [PATCH v32 06/12] fs,security: Add sb_delete hook
` [PATCH v32 07/12] landlock: Support filesystem access-control
` [PATCH v32 08/12] landlock: Add syscall implementations
` [PATCH v32 09/12] arch: Wire up Landlock syscalls
` [PATCH v32 10/12] selftests/landlock: Add user space tests
` [PATCH v32 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v32 12/12] landlock: Add user and kernel documentation

[PATCH v31 00/12] Landlock LSM
 2021-04-01 17:12 UTC  (20+ messages)
` [PATCH v31 01/12] landlock: Add object management
` [PATCH v31 02/12] landlock: Add ruleset and domain management
` [PATCH v31 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v31 04/12] landlock: Add ptrace restrictions
` [PATCH v31 05/12] LSM: Infrastructure management of the superblock
` [PATCH v31 06/12] fs,security: Add sb_delete hook
` [PATCH v31 07/12] landlock: Support filesystem access-control
` [PATCH v31 08/12] landlock: Add syscall implementations
` [PATCH v31 09/12] arch: Wire up Landlock syscalls
` [PATCH v31 10/12] selftests/landlock: Add user space tests
` [PATCH v31 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v31 12/12] landlock: Add user and kernel documentation

[PATCH v9 0/6] Optionally randomize kernel stack offset each syscall
 2021-04-01 13:33 UTC  (9+ messages)
` [PATCH v9 1/6] jump_label: Provide CONFIG-driven build state defaults
` [PATCH v9 2/6] init_on_alloc: Optimize static branches
` [PATCH v9 3/6] stack: Optionally randomize kernel stack offset each syscall
` [PATCH v9 4/6] x86/entry: Enable random_kstack_offset support
` [PATCH v9 5/6] arm64: entry: "
` [PATCH v9 6/6] lkdtm: Add REPORT_STACK for checking stack offsets

[PATCH v7 0/6] Optionally randomize kernel stack offset each syscall
 2021-04-01  8:34 UTC  (14+ messages)
` [PATCH v7 1/6] jump_label: Provide CONFIG-driven build state defaults
` [PATCH v7 2/6] init_on_alloc: Optimize static branches
` [PATCH v7 3/6] stack: Optionally randomize kernel stack offset each syscall
` [PATCH v7 4/6] x86/entry: Enable random_kstack_offset support
` [PATCH v7 5/6] arm64: entry: "
` [PATCH v7 6/6] lkdtm: Add REPORT_STACK for checking stack offsets

[PATCH v5 0/1] Unprivileged chroot
 2021-03-31  6:33 UTC  (11+ messages)
` [PATCH v5 1/1] fs: Allow no_new_privs tasks to call chroot(2)

two potential randstruct improvements
 2021-03-30 21:18 UTC  (3+ messages)

[PATCH v5 1/1] fs: Allow no_new_privs tasks to call chroot(2)
 2021-03-27 18:56 UTC  (2+ messages)

[PATCH v6 0/8] Fork brute force attack mitigation
 2021-03-26 15:41 UTC  (30+ messages)
` [PATCH v6 1/8] security: Add LSM hook at the point where a task gets a fatal signal
` [PATCH v6 2/8] security/brute: Define a LSM and manage statistical data
` [PATCH v6 3/8] securtiy/brute: Detect a brute force attack
` [PATCH v6 4/8] security/brute: Fine tuning the attack detection
` [PATCH v6 5/8] security/brute: Mitigate a brute force attack
` [PATCH v6 6/8] selftests/brute: Add tests for the Brute LSM
` [PATCH v6 7/8] Documentation: Add documentation "

[PATCH v30 00/12] Landlock LSM
 2021-03-25  9:29 UTC  (49+ messages)
` [PATCH v30 01/12] landlock: Add object management
` [PATCH v30 02/12] landlock: Add ruleset and domain management
` [PATCH v30 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v30 04/12] landlock: Add ptrace restrictions
` [PATCH v30 05/12] LSM: Infrastructure management of the superblock
` [PATCH v30 06/12] fs,security: Add sb_delete hook
` [PATCH v30 07/12] landlock: Support filesystem access-control
` [PATCH v30 08/12] landlock: Add syscall implementations
` [PATCH v30 09/12] arch: Wire up Landlock syscalls
` [PATCH v30 10/12] selftests/landlock: Add user space tests
` [PATCH v30 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v30 12/12] landlock: Add user and kernel documentation

Fine-grained Forward CFI on top of Intel CET / IBT
 2021-03-19 22:51 UTC  (4+ messages)

[PATCH v6 0/6] Optionally randomize kernel stack offset each syscall
 2021-03-18 12:46 UTC  (3+ messages)
` [PATCH v6 2/6] init_on_alloc: Optimize static branches


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).