kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2016-04-06 18:31:50 to 2016-04-28 02:36:48 UTC [more...]

[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
 2016-04-28  2:36 UTC  (4+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v5] mm: SLAB freelist randomization
 2016-04-27 20:04 UTC  (3+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v4] mm: SLAB freelist randomization
 2016-04-27 15:40 UTC  (6+ messages)
` [kernel-hardening] "

[kernel-hardening] status: GRKERNSEC_KSTACKOVERFLOW
 2016-04-27  8:30 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v7 0/6] Introduce GCC plugin infrastructure
 2016-04-27  1:40 UTC  (10+ messages)
` [kernel-hardening] [PATCH v7 1/6] Shared library support
` [kernel-hardening] [PATCH v7 2/6] GCC plugin infrastructure
` [kernel-hardening] [PATCH v7 3/6] The GCC plugin infrastructure supports the arm and arm64 architectures too
` [kernel-hardening] [PATCH v7 4/6] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v7 5/6] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v7 6/6] Add sancov plugin
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v7 0/6] Introduce GCC plugin infrastructure

[kernel-hardening] [PATCH v2] mm: SLAB freelist randomization
 2016-04-26 14:19 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH] mm: SLAB freelist randomization
 2016-04-25 21:04 UTC  (8+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH 0/4] x86, boot: KASLR memory randomization
 2016-04-25 16:39 UTC 

[kernel-hardening] [PATCH 1/4] x86, boot: Refactor KASLR entropy functions
 2016-04-25 16:37 UTC  (4+ messages)
` [kernel-hardening] [PATCH 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [PATCH 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
` [kernel-hardening] [PATCH 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
 2016-04-24 16:27 UTC  (5+ messages)
` [kernel-hardening] [PATCH v4 4/4] Documentation: SROP Mitigation: Add documentation for SROP cookies
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies

[kernel-hardening][RFC PATCH v2 00/12] Add PAX_REFCOUNT overflow protection
 2016-04-21 20:37 UTC  (7+ messages)

[kernel-hardening] status: GRKERNSEC_BRUTE
 2016-04-21 20:33 UTC  (4+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC v1 0/4] x86, boot: KASLR memory implementation (x86_64)
 2016-04-21 20:18 UTC  (16+ messages)
` [kernel-hardening] [RFC v1 1/4] x86, boot: Refactor KASLR entropy functions
` [kernel-hardening] [RFC v1 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [RFC v1 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] [PATCH v6 0/6] Introduce GCC plugin infrastructure
 2016-04-21 16:55 UTC  (16+ messages)
` [kernel-hardening] [PATCH v6 1/6] Shared library support
` [kernel-hardening] [PATCH v6 2/6] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v6 3/6] The GCC plugin infrastructure supports the arm and arm64 architectures too
` [kernel-hardening] [PATCH v6 4/6] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v6 5/6] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v6 6/6] Add sancov plugin
` [kernel-hardening] Re: [PATCH v6 0/6] Introduce GCC plugin infrastructure

[kernel-hardening] ARMv8.0 PAN emulation
 2016-04-20 22:59 UTC  (3+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v2] mm: SLAB freelist randomization
 2016-04-20 14:47 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v2] mm: SLAB freelist randomization
 2016-04-18 17:00 UTC 

[kernel-hardening] [PATCH v5 00/21] x86, boot: KASLR cleanup and 64-bit improvements
 2016-04-18 16:50 UTC  (40+ messages)
` [kernel-hardening] [PATCH v5 01/21] x86, KASLR: Remove unneeded boot_params argument
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 02/21] x86, KASLR: Handle kernel relocation above 2G
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 03/21] x86, KASLR: Drop CONFIG_RANDOMIZE_BASE_MAX_OFFSET
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 04/21] x86, boot: Move compressed kernel to end of decompression buffer
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 05/21] x86, boot: Calculate decompression size during boot not build
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 06/21] x86, KASLR: Update description for decompressor worst case size
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 07/21] x86, boot: Fix run_size calculation
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 08/21] x86, KASLR: Clean up unused code from old run_size
` [kernel-hardening] [PATCH v5 09/21] x86, KASLR: Correctly bounds-check relocations
` [kernel-hardening] [PATCH v5 10/21] x86, KASLR: Consolidate mem_avoid entries
` [kernel-hardening] [PATCH v5 11/21] x86, boot: Split out kernel_ident_mapping_init
` [kernel-hardening] [PATCH v5 12/21] x86, 64bit: Set ident_mapping for KASLR
` [kernel-hardening] [PATCH v5 13/21] x86, boot: Report overlap failures in memcpy
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 14/21] x86, KASLR: Add slot_area to manage random slots
` [kernel-hardening] [PATCH v5 15/21] x86, KASLR: Add slot_area support functions
` [kernel-hardening] [PATCH v5 16/21] x86, KASLR: Add virtual address choosing function
` [kernel-hardening] [PATCH v5 17/21] x86, KASLR: Clarify purpose of each get_random_long
` [kernel-hardening] [PATCH v5 18/21] x86, KASLR: Randomize virtual address separately
` [kernel-hardening] [PATCH v5 19/21] x86, KASLR: Add physical address randomization >4G
` [kernel-hardening] [PATCH v5 20/21] x86, KASLR: Remove unused slot tracking code
` [kernel-hardening] [PATCH v5 21/21] x86, KASLR: Allow randomization below load address

[kernel-hardening] [PATCH v2] kaslr: allow kASLR to be default over Hibernation
 2016-04-16 19:58 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] Re: [PATCH v4 00/20] x86, boot: kaslr cleanup and 64bit kaslr support
 2016-04-15  6:55 UTC  (10+ messages)

[kernel-hardening] [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
 2016-04-14  7:39 UTC  (20+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH 0/2] Document and extend kernel.perf_event_paranoid
 2016-04-13 16:12 UTC  (3+ messages)
` [kernel-hardening] [PATCH 2/2] security,perf: Allow further restriction of perf_event_open

[kernel-hardening] [PATCH] Prefer kASLR over Hibernation
 2016-04-12 17:51 UTC  (19+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC v2] mm: SLAB freelist randomization
 2016-04-11 19:08 UTC  (6+ messages)

[kernel-hardening] [RFC v1] mm: SLAB freelist randomization
 2016-04-08  2:31 UTC  (9+ messages)
` [kernel-hardening] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).