[<prev day] [next day>] [month] [year] [list]
kernel-hardening mailing list - 2016/06/16
- Re: [RFC][PATCH v2 0/4] mm: Hardened usercopy (Valdis.Kletnieks@...edu)
- Re: [RFC][PATCH v2 0/4] mm: Hardened usercopy (Kees Cook <keescook@...omium.org>)
- Re: [PATCH 12/13] x86/mm/64: Enable vmapped stacks (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 00/13] Virtually mapped stacks with guard pages (x86,
core) (Heiko Carstens <heiko.carstens@...ibm.com>)
- [PATCH 00/13] Virtually mapped stacks with guard pages (x86, core) (Andy Lutomirski <luto@...nel.org>)
- [PATCH 02/13] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated (Andy Lutomirski <luto@...nel.org>)
- [PATCH 01/13] x86/mm/hotplug: Don't remove PGD entries in remove_pagetable() (Andy Lutomirski <luto@...nel.org>)
- [PATCH 03/13] x86/cpa: Warn if kernel_unmap_pages_in_pgd is used inappropriately (Andy Lutomirski <luto@...nel.org>)
- [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of number of stacks (Andy Lutomirski <luto@...nel.org>)
- [PATCH 05/13] mm: Move memcg stack accounting to account_kernel_stack (Andy Lutomirski <luto@...nel.org>)
- [PATCH 06/13] fork: Add generic vmalloced stack support (Andy Lutomirski <luto@...nel.org>)
- [PATCH 07/13] x86/die: Don't try to recover from an OOPS on a non-default stack (Andy Lutomirski <luto@...nel.org>)
- [PATCH 08/13] x86/dumpstack: When OOPSing, rewind the stack before do_exit (Andy Lutomirski <luto@...nel.org>)
- [PATCH 09/13] x86/dumpstack: When dumping stack bytes due to OOPS, start with regs->sp (Andy Lutomirski <luto@...nel.org>)
- [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on stack overflow (Andy Lutomirski <luto@...nel.org>)
- [PATCH 11/13] x86/dumpstack/64: Handle faults when printing the "Stack:" part of an OOPS (Andy Lutomirski <luto@...nel.org>)
- [PATCH 12/13] x86/mm/64: Enable vmapped stacks (Andy Lutomirski <luto@...nel.org>)
- [PATCH 13/13] x86/mm: Improve stack-overflow #PF handling (Andy Lutomirski <luto@...nel.org>)
- Re: [PATCH 12/13] x86/mm/64: Enable vmapped stacks (Mika Penttilä <mika.penttila@...tfour.com>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Vladimir Davydov <vdavydov@...tuozzo.com>)
- Re: [PATCH 09/13] x86/dumpstack: When dumping stack bytes due to
OOPS, start with regs->sp (Borislav Petkov <bp@...en8.de>)
- Re: Re: [PATCH 12/13] x86/mm/64: Enable vmapped
stacks (Rik van Riel <riel@...hat.com>)
- Initialising random(4) (Sandy Harris <sandyinchina@...il.com>)
- Re: Initialising random(4) (Kees Cook <keescook@...omium.org>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 00/13] Virtually mapped stacks with guard pages (x86, core) (Kees Cook <keescook@...omium.org>)
- Re: [PATCH 06/13] fork: Add generic vmalloced stack support (Kees Cook <keescook@...omium.org>)
- Re: Initialising random(4) (Sandy Harris <sandyinchina@...il.com>)
- Re: [PATCH 06/13] fork: Add generic vmalloced stack support (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Andy Lutomirski <luto@...capital.net>)
- Re: Initialising random(4) (Kees Cook <keescook@...omium.org>)
- Re: [PATCH 00/13] Virtually mapped stacks with guard pages (x86, core) (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 08/13] x86/dumpstack: When OOPSing, rewind the stack
before do_exit (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 08/13] x86/dumpstack: When OOPSing, rewind the stack
before do_exit (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 00/13] Virtually mapped stacks with guard pages (x86, core) (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on
stack overflow (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on
stack overflow (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on
stack overflow (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on
stack overflow (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 10/13] x86/dumpstack: Try harder to get a call trace on
stack overflow (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 04/13] mm: Track NR_KERNEL_STACK in pages instead of
number of stacks (Josh Poimboeuf <jpoimboe@...hat.com>)
- Re: [PATCH 00/13] Virtually mapped stacks with guard pages (x86, core) (Andy Lutomirski <luto@...capital.net>)
- Re: [PATCH 2/2] security,perf: Allow further
restriction of perf_event_open (Kees Cook <keescook@...omium.org>)
- Re: [RFC][PATCH v2 0/4] mm: Hardened usercopy (Valdis.Kletnieks@...edu)
46 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.