[<prev day] [next day>] [month] [year] [list]
kernel-hardening mailing list - 2017/06/06
- Re: Stop the plagiarism (Kees Cook <keescook@...omium.org>)
- [PATCH v3 00/13] Unseeded In-Kernel Randomness Fixes ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 01/13] random: add synchronous API for the urandom pool ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 03/13] random: invalidate batched entropy after crng init ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 05/13] security/keys: ensure RNG is seeded before use ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 06/13] iscsi: ensure RNG is seeded before use ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 07/13] ceph: ensure RNG is seeded before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 08/13] cifs: use get_random_u32 for 32-bit lock random ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 09/13] rhashtable: use get_random_u32 for hash_rnd ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 11/13] net/route: use get_random_int for random counter ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 10/13] net/neighbor: use get_random_u32 for 32-bit hash random ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 13/13] random: warn when kernel uses unseeded randomness ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v3 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before
using (Theodore Ts'o <tytso@....edu>)
- Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using (Eric Biggers <ebiggers3@...il.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>)
- Re: [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait
family (Jeffrey Walton <noloader@...il.com>)
- Re: Re: [PATCH 3.18 01/33] Revert
"stackprotector: Increase the per-task stack canarys random range from 32
bits to 64… (Greg Kroah-Hartman <gregkh@...uxfoundat…)
- Re: [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs (Greg Kroah-Hartman <gregkh@...uxfoundation.org>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH 3/5] Protectable Memory Allocator -
Debug interface (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH v3 05/13] security/keys: ensure RNG is seeded before use (David Howells <dhowells@...hat.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Christoph Hellwig <hch@...radead.org>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait
family ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH v3 05/13] security/keys: ensure RNG is seeded before use ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: Stop the plagiarism (Jonathan Corbet <corbet@....net>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH 4/5] Make LSM Writable Hooks a command line option (Casey Schaufler <casey@...aufler-ca.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH 2/5] Protectable Memory Allocator (Laura Abbott <labbott@...hat.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using (Theodore Ts'o <tytso@....edu>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using (Eric Biggers <ebiggers3@...il.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 00/13] Unseeded In-Kernel Randomness Fixes ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 01/13] random: invalidate batched entropy after crng init ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 04/13] security/keys: ensure RNG is seeded before use ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 02/13] random: add synchronous API for the urandom pool ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 06/13] iscsi: ensure RNG is seeded before use ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 03/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 05/13] crypto/rng: ensure that the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 07/13] ceph: ensure RNG is seeded before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 08/13] cifs: use get_random_u32 for 32-bit lock random ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 11/13] net/route: use get_random_int for random counter ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 10/13] net/neighbor: use get_random_u32 for 32-bit hash random ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 13/13] random: warn when kernel uses unseeded randomness ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v4 09/13] rhashtable: use get_random_u32 for hash_rnd ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH] security/keys: rewrite all of big_key crypto ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using (Stephan Müller <smueller@...onox.de>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using ("Jason A. Donenfeld" <Jason@...c4.com>)
- [RFC v5 PATCH 0/4] NOT FOR MERGE - ro protection for dynamic data (Igor Stoppa <igor.stoppa@...wei.com>)
- [PATCH 1/4] LSM: Convert security_hook_heads into explicit array of struct list_head (Igor Stoppa <igor.stoppa@...wei.com>)
- [PATCH 2/4] Protectable Memory Allocator (Igor Stoppa <igor.stoppa@...wei.com>)
- [PATCH 4/4] Make LSM Writable Hooks a command line option (Igor Stoppa <igor.stoppa@...wei.com>)
- [PATCH 3/4] Protectable Memory Allocator - Debug interface (Igor Stoppa <igor.stoppa@...wei.com>)
- Re: [PATCH] security/keys: rewrite all of big_key crypto ("Jason A. Donenfeld" <Jason@...c4.com>)
- Re: [PATCH] security/keys: rewrite all of big_key crypto ("Jason A. Donenfeld" <Jason@...c4.com>)
- [PATCH v2] security/keys: rewrite all of big_key crypto ("Jason A. Donenfeld" <Jason@...c4.com>)
- symlink/hardlink/FIFO restrictions (Solar Designer <solar@...nwall.com>)
- Re: symlink/hardlink/FIFO restrictions (Solar Designer <solar@...nwall.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using (Henrique de Moraes Holschuh <hmh@....eng.br>)
- Re: symlink/hardlink/FIFO restrictions (Solar Designer <solar@...nwall.com>)
- Re: Re: [PATCH v3 04/13] crypto/rng: ensure that
the RNG is ready before using (Theodore Ts'o <tytso@....edu>)
78 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.