kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2016-03-27 05:03:10 to 2016-04-18 14:46:05 UTC [more...]

[kernel-hardening] [RFC v1 0/4] x86, boot: KASLR memory implementation (x86_64)
 2016-04-18 14:46 UTC  (6+ messages)
` [kernel-hardening] [RFC v1 1/4] x86, boot: Refactor KASLR entropy functions
` [kernel-hardening] [RFC v1 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [RFC v1 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] [PATCH v2] kaslr: allow kASLR to be default over Hibernation
 2016-04-16 19:58 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v5 00/21] x86, boot: KASLR cleanup and 64-bit improvements
 2016-04-16  9:00 UTC  (39+ messages)
` [kernel-hardening] [PATCH v5 01/21] x86, KASLR: Remove unneeded boot_params argument
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 02/21] x86, KASLR: Handle kernel relocation above 2G
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 03/21] x86, KASLR: Drop CONFIG_RANDOMIZE_BASE_MAX_OFFSET
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 04/21] x86, boot: Move compressed kernel to end of decompression buffer
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 05/21] x86, boot: Calculate decompression size during boot not build
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 06/21] x86, KASLR: Update description for decompressor worst case size
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 07/21] x86, boot: Fix run_size calculation
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 08/21] x86, KASLR: Clean up unused code from old run_size
` [kernel-hardening] [PATCH v5 09/21] x86, KASLR: Correctly bounds-check relocations
` [kernel-hardening] [PATCH v5 10/21] x86, KASLR: Consolidate mem_avoid entries
` [kernel-hardening] [PATCH v5 11/21] x86, boot: Split out kernel_ident_mapping_init
` [kernel-hardening] [PATCH v5 12/21] x86, 64bit: Set ident_mapping for KASLR
` [kernel-hardening] [PATCH v5 13/21] x86, boot: Report overlap failures in memcpy
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 14/21] x86, KASLR: Add slot_area to manage random slots
` [kernel-hardening] [PATCH v5 15/21] x86, KASLR: Add slot_area support functions
` [kernel-hardening] [PATCH v5 16/21] x86, KASLR: Add virtual address choosing function
` [kernel-hardening] [PATCH v5 17/21] x86, KASLR: Clarify purpose of each get_random_long
` [kernel-hardening] [PATCH v5 18/21] x86, KASLR: Randomize virtual address separately
` [kernel-hardening] [PATCH v5 19/21] x86, KASLR: Add physical address randomization >4G
` [kernel-hardening] [PATCH v5 20/21] x86, KASLR: Remove unused slot tracking code
` [kernel-hardening] [PATCH v5 21/21] x86, KASLR: Allow randomization below load address

[kernel-hardening] [PATCH] mm: SLAB freelist randomization
 2016-04-15 22:47 UTC  (4+ messages)
` [kernel-hardening] "

[kernel-hardening] ARMv8.0 PAN emulation
 2016-04-15  8:58 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] Re: [PATCH v4 00/20] x86, boot: kaslr cleanup and 64bit kaslr support
 2016-04-15  6:55 UTC  (10+ messages)

[kernel-hardening] [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
 2016-04-14  7:39 UTC  (22+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH 0/2] Document and extend kernel.perf_event_paranoid
 2016-04-13 16:12 UTC  (3+ messages)
` [kernel-hardening] [PATCH 2/2] security,perf: Allow further restriction of perf_event_open

[kernel-hardening] [PATCH v6 0/6] Introduce GCC plugin infrastructure
 2016-04-13  2:35 UTC  (15+ messages)
` [kernel-hardening] [PATCH v6 1/6] Shared library support
` [kernel-hardening] [PATCH v6 2/6] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v6 3/6] The GCC plugin infrastructure supports the arm and arm64 architectures too
` [kernel-hardening] [PATCH v6 4/6] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v6 5/6] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v6 6/6] Add sancov plugin
` [kernel-hardening] Re: [PATCH v6 0/6] Introduce GCC plugin infrastructure

[kernel-hardening] [PATCH] Prefer kASLR over Hibernation
 2016-04-12 17:51 UTC  (19+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC v2] mm: SLAB freelist randomization
 2016-04-11 19:08 UTC  (6+ messages)

[kernel-hardening] [RFC v1] mm: SLAB freelist randomization
 2016-04-08  2:31 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v2 00/11] MIPS relocatable kernel & KASLR
 2016-04-05 21:00 UTC  (22+ messages)
` [kernel-hardening] [PATCH v2 01/11] MIPS: tools: Add relocs tool
` [kernel-hardening] [PATCH v2 02/11] MIPS: tools: Build "
` [kernel-hardening] [PATCH v2 03/11] MIPS: Reserve space for relocation table
` [kernel-hardening] [PATCH v2 04/11] MIPS: Generate relocation table when CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 05/11] MIPS: Kernel: Add relocate.c
` [kernel-hardening] [PATCH v2 06/11] MIPS: Call relocate_kernel if CONFIG_RELOCATABLE=y
` [kernel-hardening] [PATCH v2 07/11] MIPS: bootmem: When relocatable, free memory below kernel
` [kernel-hardening] [PATCH v2 08/11] MIPS: Add CONFIG_RELOCATABLE Kconfig option
` [kernel-hardening] [PATCH v2 09/11] MIPS: Introduce plat_get_fdt a platform API to retrieve the FDT
` [kernel-hardening] [PATCH v2 10/11] MIPS: Kernel: Implement KASLR using CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 11/11] MIPS: KASLR: Print relocation Information on boot
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v5 0/5] Introduce GCC plugin infrastructure
 2016-04-02  4:32 UTC  (7+ messages)
` [kernel-hardening] [PATCH v5 2/5] "
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
 2016-04-01 12:57 UTC  (27+ messages)
` [kernel-hardening] [PATCH v4 1/4] SROP Mitigation: Architecture independent code for signal cookies
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/4] x86: SROP Mitigation: Implement Signal Cookies
` [kernel-hardening] [PATCH v4 3/4] Sysctl: SROP Mitigation: Add Sysctl argument to disable SROP
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 4/4] Documentation: SROP Mitigation: Add documentation for SROP cookies
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies

[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
 2016-03-29 19:07 UTC  (13+ messages)
` [kernel-hardening] [RFC v1 03/17] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
  ` [kernel-hardening] "
      ` [kernel-hardening] [PATCH 1/2] "
        ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 04/17] selftest/seccomp: Fix the seccomp(2) signature
  ` [kernel-hardening] "
      ` [kernel-hardening] [PATCH 2/2] "
        ` [kernel-hardening] "
` [kernel-hardening] Re: [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).