kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2016-02-16 16:32:19 to 2016-03-24 02:53:54 UTC [more...]

[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
 2016-03-24  2:53 UTC  (10+ messages)
` [kernel-hardening] [RFC v1 01/17] um: Export the sys_call_table
` [kernel-hardening] [RFC v1 02/17] seccomp: Fix typo
` [kernel-hardening] [RFC v1 03/17] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
` [kernel-hardening] [RFC v1 04/17] selftest/seccomp: Fix the seccomp(2) signature
` [kernel-hardening] [RFC v1 05/17] security/seccomp: Add LSM and create arrays of syscall metadata
` [kernel-hardening] [RFC v1 06/17] seccomp: Add the SECCOMP_ADD_CHECKER_GROUP command
` [kernel-hardening] [RFC v1 07/17] seccomp: Add seccomp object checker evaluation
` [kernel-hardening] [RFC v1 08/17] selftest/seccomp: Remove unknown_ret_is_kill_above_allow test
` [kernel-hardening] [RFC v1 09/17] selftest/seccomp: Extend seccomp_data until matches[6]

[kernel-hardening] [PATCH v5 0/5] Introduce GCC plugin infrastructure
 2016-03-24  0:07 UTC  (29+ messages)
` [kernel-hardening] [PATCH v5 1/5] Shared library support
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/5] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 3/5] Add Cyclomatic complexity GCC plugin
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 4/5] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v5 5/5] Add sancov plugin
  ` [kernel-hardening] "

[kernel-hardening] [CSW16] Getting Physical: Extreme Abuse of Intel Based Paging Systems
 2016-03-23 12:32 UTC 

[kernel-hardening] [PATCH] s390: disable postinit-readonly for now
 2016-03-21 19:33 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies
 2016-03-10  9:43 UTC  (18+ messages)
` [kernel-hardening] [PATCH v3 2/3] x86: SROP mitigation: implement "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 3/3] SROP mitigation: Add sysctl to disable SROP protection
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies

[kernel-hardening] [PATCHv4 0/2] Sanitization of buddy pages
 2016-03-09 21:00 UTC  (7+ messages)
` [kernel-hardening] [PATCHv4 1/2] mm/page_poison.c: Enable PAGE_POISONING as a separate option
  ` [kernel-hardening] "
` [kernel-hardening] [PATCHv4 2/2] mm/page_poisoning.c: Allow for zero poisoning
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCHv4 0/2] Sanitization of buddy pages

[kernel-hardening] [RFC][PATCH] s390, postinit-readonly: implement post-init RO
 2016-03-08 12:56 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v5 0/7] introduce post-init read-only memory
 2016-03-08  0:23 UTC  (12+ messages)
` [kernel-hardening] [PATCH v5 1/7] asm-generic: consolidate mark_rodata_ro()
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/7] init: create cmdline param to disable readonly
` [kernel-hardening] [PATCH v5 3/7] x86: make CONFIG_DEBUG_RODATA non-optional
` [kernel-hardening] [PATCH v5 4/7] introduce post-init read-only memory
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 5/7] lkdtm: verify that __ro_after_init works correctly
` [kernel-hardening] [PATCH v5 6/7] x86, vdso: mark vDSO read-only after init
` [kernel-hardening] [PATCH v5 7/7] ARM: vdso: Mark vDSO code as read-only

[kernel-hardening] [PATCH v4 0/3] Introduce GCC plugin infrastructure
 2016-03-02 21:33 UTC  (13+ messages)
` [kernel-hardening] [PATCH v4 1/3] "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/3] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v4 3/3] Documentation for the GCC plugin infrastructure
` [kernel-hardening] Re: [PATCH v4 0/3] Introduce "

[kernel-hardening] [PULL] lkdtm update (next)
 2016-03-02  0:53 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC 0/2] format_template attribute
 2016-03-01 21:54 UTC  (5+ messages)
` [kernel-hardening] [RFC 1/2] plugins: implement "
` [kernel-hardening] [RFC 2/2] compiler.h: add __format_template

[kernel-hardening] [PATCHv2] lkdtm: Add READ_AFTER_FREE test
 2016-03-01  1:37 UTC  (21+ messages)
` [kernel-hardening] "

[kernel-hardening] XPFO RFC
 2016-02-26 23:19 UTC 

[kernel-hardening] [PATCHv2 0/3] LKDTM use after free test updates
 2016-02-26 22:57 UTC  (7+ messages)
` [kernel-hardening] [PATCHv4 1/3] lkdtm: Add READ_AFTER_FREE test
` [kernel-hardening] [PATCH 2/3] lkdtm: Update WRITE_AFTER_FREE test
` [kernel-hardening] [PATCHv2 3/3] lkdtm: Add read/write after free tests for buddy memory
` [kernel-hardening] Re: [PATCHv2 0/3] LKDTM use after free test updates

[kernel-hardening] [PATCH v3 0/3] Introduce GCC plugin infrastructure
 2016-02-25 22:45 UTC  (8+ messages)
` [kernel-hardening] [PATCH v3 1/3] "
` [kernel-hardening] [PATCH v3 2/3] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v3 3/3] Documentation for the GCC plugin infrastructure
` [kernel-hardening] Re: [PATCH v3 0/3] Introduce "

[kernel-hardening] [RFC][PATCH] lkdtm: improve use-after-free tests
 2016-02-24 23:27 UTC 

[kernel-hardening] [PATCHv2 0/4] Improve performance for SLAB_POISON
 2016-02-24 18:09 UTC  (9+ messages)
` [kernel-hardening] [PATCHv2 1/4] slub: Drop lock at the end of free_debug_processing
  ` [kernel-hardening] "
` [kernel-hardening] [PATCHv2 3/4] slub: Convert SLAB_DEBUG_FREE to SLAB_CONSISTENCY_CHECKS
  ` [kernel-hardening] "
` [kernel-hardening] [PATCHv2 4/4] slub: Relax CMPXCHG consistency restrictions
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCHv2 0/4] Improve performance for SLAB_POISON

[kernel-hardening] [PATCH 0/2] LKDTM test updates
 2016-02-23 22:13 UTC  (4+ messages)
` [kernel-hardening] [PATCHv3 1/2] lkdtm: Add READ_AFTER_FREE test
` [kernel-hardening] [PATCH 2/2] lkdtm: Add read/write after free tests for buddy memory
  ` [kernel-hardening] "

[kernel-hardening] [PATCH] lkdtm: add test for executing .rodata
 2016-02-23 22:02 UTC  (20+ messages)
` [kernel-hardening] "

[kernel-hardening] Meta: Adding 'List-id' header to kernel-hardening posts
 2016-02-20 17:12 UTC  (4+ messages)

[kernel-hardening] RE: Still working on PAX_USERCOPY
 2016-02-19  0:36 UTC 

[kernel-hardening] [PATCH v2 0/3] Introduce GCC plugin infrastructure
 2016-02-18 22:13 UTC  (10+ messages)
` [kernel-hardening] [PATCH v2 1/3] "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 2/3] Add Cyclomatic complexity GCC plugin
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 3/3] Documentation for the GCC plugin infrastructure
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/8] introduce post-init read-only memory
 2016-02-18 10:46 UTC  (8+ messages)
` [kernel-hardening] [PATCH] ARM: vdso: Mark vDSO code as read-only
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v2] lkdtm: add test for executing .rodata
 2016-02-18  0:51 UTC  (3+ messages)
` [kernel-hardening] "

[kernel-hardening] Re: [PATCH 00/42] x86: updated patches for kaslr and setup_data etc for v4.3
 2016-02-16 23:50 UTC  (3+ messages)

[kernel-hardening] Re: [PATCH] arm64: mm: Mark .rodata as RO
 2016-02-16 20:35 UTC  (3+ messages)

[kernel-hardening] [PATCH] arm64: vdso: Mark vDSO code as read-only
 2016-02-16 18:22 UTC  (2+ messages)
` [kernel-hardening] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).