kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2016-04-22 18:22:48 to 2016-05-22 21:30:34 UTC [more...]

[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
 2016-05-22 21:30 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] Choosing CCs for discussions
 2016-05-20 22:49 UTC 

[kernel-hardening] [PATCH] Subject: [RFC PATCH] mm: Hardened usercopy
 2016-05-20 18:22 UTC  (3+ messages)

[kernel-hardening] [RFC v1 0/2] mm: SLUB Freelist randomization
 2016-05-20 16:24 UTC  (11+ messages)
` [kernel-hardening] [RFC v1 1/2] mm: Reorganize SLAB freelist randomization
` [kernel-hardening] [RFC v1 2/2] mm: SLUB Freelist randomization
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v8 0/4] Introduce GCC plugin infrastructure
 2016-05-20 10:10 UTC  (17+ messages)
` [kernel-hardening] [PATCH v8 1/4] Shared library support
` [kernel-hardening] [PATCH v8 2/4] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v8 3/4] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v8 4/4] Add sancov plugin

[kernel-hardening] [PATCH] doc: self-protection: provide initial details
 2016-05-18  1:44 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v5 0/4] x86, boot: KASLR memory randomization
 2016-05-17 19:33 UTC  (10+ messages)
` [kernel-hardening] [PATCH v5 1/4] x86, boot: Refactor KASLR entropy functions
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [PATCH v5 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
` [kernel-hardening] [PATCH v5 4/4] x86, boot: Memory hotplug support for KASLR memory randomization
` [kernel-hardening] Re: [PATCH v5 0/4] x86, boot: "

[kernel-hardening] [PATCH v4 0/4] x86, boot: KASLR memory randomization
 2016-05-12 16:57 UTC  (7+ messages)
` [kernel-hardening] [PATCH v4 1/4] x86, boot: Refactor KASLR entropy functions
` [kernel-hardening] [PATCH v4 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [PATCH v4 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] [PATCH v7 0/6] Introduce GCC plugin infrastructure
 2016-05-12 15:04 UTC  (27+ messages)
` [kernel-hardening] [PATCH v7 1/6] Shared library support
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 2/6] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 3/6] The GCC plugin infrastructure supports the arm and arm64 architectures too
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 4/6] Add Cyclomatic complexity GCC plugin
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 5/6] Documentation for the GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 6/6] Add sancov plugin
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v7 0/6] Introduce GCC plugin infrastructure

[kernel-hardening] [PATCH v8 0/4] x86/KASLR: Randomize virtual address separately
 2016-05-12  8:31 UTC  (10+ messages)
` [kernel-hardening] [PATCH v8 1/4] x86/KASLR: Clarify identity map interface
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v8 2/4] x86/KASLR: Randomize virtual address separately
` [kernel-hardening] [PATCH v8 3/4] x86/KASLR: Add physical address randomization >4G
` [kernel-hardening] [PATCH v8 4/4] x86/KASLR: Allow randomization below load address

[kernel-hardening] [PATCH v3 0/4] x86, boot: KASLR memory randomization
 2016-05-10 21:28 UTC  (11+ messages)
` [kernel-hardening] [PATCH v3 1/4] x86, boot: Refactor KASLR entropy functions
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [PATCH v3 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 4/4] x86, boot: Memory hotplug support for KASLR memory randomization
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v7 0/9] x86/KASLR: Randomize virtual address separately
 2016-05-10 11:21 UTC  (17+ messages)
` [kernel-hardening] [PATCH v7 1/9] x86/KASLR: Initialize mapping_info every time
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v7 2/9] x86/boot: Add missing file header comments
` [kernel-hardening] [PATCH v7 3/9] x86/KASLR: Add slot_area to manage random_addr slots
` [kernel-hardening] [PATCH v7 4/9] x86/KASLR: Return earliest overlap when avoiding regions
` [kernel-hardening] [PATCH v7 5/9] x86/KASLR: Add virtual address choosing function
` [kernel-hardening] [PATCH v7 6/9] x86/KASLR: Clarify purpose of each get_random_long()
` [kernel-hardening] [PATCH v7 7/9] x86/KASLR: Randomize virtual address separately
` [kernel-hardening] [PATCH v7 8/9] x86/KASLR: Add physical address randomization >4G
` [kernel-hardening] [PATCH v7 9/9] x86/KASLR: Allow randomization below load address

[kernel-hardening] [PATCH v6 0/11] x86/KASLR: Randomize virtual address separately
 2016-05-08  9:17 UTC  (17+ messages)
` [kernel-hardening] [PATCH v6 01/11] x86/boot: Clean up pointer casting
` [kernel-hardening] [PATCH v6 02/11] x86/KASLR: Consolidate mem_avoid entries
` [kernel-hardening] [PATCH v6 03/11] x86/boot: Split out kernel_ident_mapping_init
` [kernel-hardening] [PATCH v6 04/11] x86/KASLR: Build identity mappings on demand
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v6 05/11] x86/KASLR: Add slot_area to manage random_addr slots
` [kernel-hardening] [PATCH v6 06/11] x86/KASLR: Return earliest overlap when avoiding regions
` [kernel-hardening] [PATCH v6 07/11] x86/KASLR: Add virtual address choosing function
` [kernel-hardening] [PATCH v6 08/11] x86/KASLR: Clarify purpose of each get_random_long
` [kernel-hardening] [PATCH v6 09/11] x86/KASLR: Randomize virtual address separately
` [kernel-hardening] [PATCH v6 10/11] x86/KASLR: Add physical address randomization >4G
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v6 11/11] x86/KASLR: Allow randomization below load address

[kernel-hardening] [PATCH 0/3] x86/KASLR: Build identity mappings on demand
 2016-05-07  5:40 UTC  (5+ messages)
` [kernel-hardening] [PATCH 1/3] x86/boot: Clean up indenting for asm/boot.h
` [kernel-hardening] [PATCH 2/3] x86/boot: Split out kernel_ident_mapping_init
` [kernel-hardening] [PATCH 3/3] x86/KASLR: Build identity mappings on demand
` [kernel-hardening] Re: [PATCH 0/3] "

[kernel-hardening] [RFC 0/3] Add struct randomization plugin
 2016-05-06 21:58 UTC  (11+ messages)
` [kernel-hardening] [RFC 1/3] Add struct randomizing plugin
  ` [kernel-hardening] "
` [kernel-hardening] [RFC 2/3] Enable the RANDSTRUCT plugin
  ` [kernel-hardening] "
` [kernel-hardening] [RFC 3/3] Change initialization C99 style; tag no_ramdomize_layout structs
  ` [kernel-hardening] "
` [kernel-hardening] Re: [RFC 0/3] Add struct randomization plugin

[kernel-hardening] [PATCH v2 0/4] x86, boot: KASLR memory implementation
 2016-05-03 19:16 UTC  (11+ messages)
` [kernel-hardening] [PATCH v2 1/4] x86, boot: Refactor KASLR entropy functions
` [kernel-hardening] [PATCH v2 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] BPF JIT spray attack - proof of concept code for modern kernel
 2016-05-03 17:01 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH 0/4] x86, boot: KASLR memory randomization
 2016-04-29 16:42 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v4] mm: SLAB freelist randomization
 2016-04-29  7:18 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening][RFC PATCH v2 00/12] Add PAX_REFCOUNT overflow protection
 2016-04-28 12:16 UTC  (8+ messages)
            ` [kernel-hardening][RFC PATCH 0/5] "

[kernel-hardening] [PATCH v5] mm: SLAB freelist randomization
 2016-04-27 20:04 UTC  (3+ messages)
` [kernel-hardening] "

[kernel-hardening] status: GRKERNSEC_KSTACKOVERFLOW
 2016-04-27  8:30 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v2] mm: SLAB freelist randomization
 2016-04-26 14:19 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH] mm: SLAB freelist randomization
 2016-04-25 21:04 UTC  (8+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH 1/4] x86, boot: Refactor KASLR entropy functions
 2016-04-25 16:37 UTC  (4+ messages)
` [kernel-hardening] [PATCH 2/4] x86, boot: PUD VA support for physical mapping (x86_64)
` [kernel-hardening] [PATCH 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)
` [kernel-hardening] [PATCH 4/4] x86, boot: Memory hotplug support for KASLR memory randomization

[kernel-hardening] [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
 2016-04-24 16:27 UTC  (5+ messages)
` [kernel-hardening] [PATCH v4 4/4] Documentation: SROP Mitigation: Add documentation for SROP cookies
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).