[<prev day] [next day>] [month] [year] [list]
kernel-hardening mailing list - 2012/04/06
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 07/15] asm/syscall.h: add syscall_get_arch (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent
execve from granting privs (Jonathan Corbet <corbet@....net>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Kees Cook <keescook@...omium.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF ("H. Peter Anvin" <hpa@...or.com>)
- Re: [PATCH v17 08/15] seccomp: add system call filtering using BPF (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 09/15] seccomp: remove duplicated failure logging (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Andrew Lutomirski <luto@....edu>)
- Re: [PATCH v17 10/15] seccomp: add SECCOMP_RET_ERRNO (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 13/15] ptrace,seccomp: Add PTRACE_SECCOMP support (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 15/15] Documentation: prctl/seccomp_filter (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 00/15] seccomp_filter: BPF-based syscall filtering (Andrew Morton <akpm@...ux-foundation.org>)
- Re: [PATCH v17 01/15] Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve
from granting privs (Markus Gutschke <markus@...omium.org>)
22 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.