- 25 Jul, 2018 2 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
- 24 Jul, 2018 8 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
1. don't duplicate opts[0].name in the successful output; 2. fix the bug with printing None state, just reuse the OptCheck.result.
Alexander Popov authored -
Alexander Popov authored
-
Detect STRICT_DEVMEM and IO_STRICT_DEVMEM as not being needed whenever DEVMEM is not set. Conflicts resolved by @a13xp0p0v
anthraxx authored -
Alexander Popov authored
-
Alexander Popov authored
-
The OR class implementation supports combining Opt's logically with an or-operator. If any of the Opt's provided to the OR class returns True, the check is considered OK. Fixes #1 Conflicts resolved by @a13xp0p0v
anthraxx authored
-
- 20 Jul, 2018 23 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
HacKurx authored
-
config check is NOT PASSED: 44 errors
Loïc authored -
config check is NOT PASSED: 33 errors
Loïc authored -
As requested by a13xp0p0v.
Loïc authored -
config check is NOT PASSED: 49 errors
Loïc authored -
config check is NOT PASSED: 49 errors
Loïc authored -
Linux historical interest is not secure ;) Conflicts resolved by @a13xp0p0v
Loïc authored -
Alexander Popov authored
-
Alexander Popov authored
-
Alexander Popov authored
-
anthraxx authored
-
Alexander Popov authored
-
Conflicts resolved by @a13xp0p0v:
anthraxx authored -
Also print the value of the unknown option
Alexander Popov authored -
Alexander Popov authored
-
Alexander Popov authored
-
Alexander Popov authored
-
Alexander Popov authored
-
That will change the check result FAIL: "not found" onto initial FAIL: not found
Alexander Popov authored -
Alexander Popov authored
-
This improves the opt storage using a kconfig key based dict to avoid looping through all opts to get a certain entry by allowing key based lookups.
anthraxx authored
-
- 13 Jul, 2018 3 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
anthraxx authored
-
- 05 Jul, 2018 2 commits
-
-
Alexander Popov authored
-
Carefully extracted from their last public patch
Alexander Popov authored
-
- 04 Jul, 2018 2 commits
-
-
STRICT_DEVMEM and IO_STRICT_DEVMEM, SECCOMP and SECCOMP_FILTER are not self protection features. They cut attack surface. I'm also not sure about SYN_COOKIES. Mark it with a comment.
Alexander Popov authored -
Alexander Popov authored
-