[<prev month] [next month>] [year] [list]
kernel-hardening mailing list - 2012/04
Mon | Tue | Wed | Thu | Fri | Sat | Sun
|
---|
| 1
|
2 | 3 | 4 | 5 | 6 22 | 7 | 8 1
|
9 13 | 10 10 | 11 5 | 12 22 | 13 4 | 14 2 | 15
|
16 2 | 17 | 18 2 | 19 1 | 20 | 21 | 22
|
23 | 24 | 25 | 26 | 27 | 28 | 29
|
30 |
|
Messages by day:
April 6 (22 messages)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 07/15] asm/syscall.h: add syscall_get_arch (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Jonathan Corbet <corbet@....net>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Kees Cook <keescook@...omium.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF ("H. Peter Anvin" <hpa@...or.com>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 09/15] seccomp: remove duplicated failure logging (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 10/15] seccomp: add SECCOMP_RET_ERRNO (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 13/15] ptrace,seccomp: Add PTRACE_SECCOMP support (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 15/15] Documentation: prctl/seccomp_filter (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 00/15] seccomp_filter: BPF-based syscall filtering (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
April 8 (1 message)
April 9 (13 messages)
April 10 (10 messages)
April 11 (5 messages)
April 12 (22 messages)
April 13 (4 messages)
April 14 (2 messages)
April 16 (2 messages)
April 18 (2 messages)
April 19 (1 message)
84 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.