kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2018-11-30 08:42:05 to 2018-12-20 17:30:01 UTC [more...]

[RFC v2 PATCH 0/12] hardening: statically allocated protected memory
 2018-12-20 17:30 UTC  (16+ messages)
` [PATCH 01/12] x86_64: memset_user()
` [PATCH 02/12] __wr_after_init: linker section and label
` [PATCH 03/12] __wr_after_init: generic header
` [PATCH 04/12] __wr_after_init: x86_64: __wr_op
` [PATCH 05/12] __wr_after_init: x86_64: debug writes
` [PATCH 06/12] __wr_after_init: Documentation: self-protection
` [PATCH 07/12] __wr_after_init: lkdtm test
` [PATCH 08/12] rodata_test: refactor tests
` [PATCH 09/12] rodata_test: add verification for __wr_after_init
` [PATCH 10/12] __wr_after_init: test write rare functionality
` [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
` [PATCH 12/12] x86_64: __clear_user as case of __memset_user

[RFC PATCH 0/6] Process-local memory allocations
 2018-12-19 23:00 UTC  (4+ messages)

[RFC v1 PATCH 0/6] hardening: statically allocated protected memory
 2018-12-19 22:50 UTC  (16+ messages)
` [PATCH 1/6] __wr_after_init: linker section and label
` [PATCH 2/6] __wr_after_init: write rare for static allocation
` [PATCH 3/6] rodata_test: refactor tests
` [PATCH 4/6] rodata_test: add verification for __wr_after_init
` [PATCH 5/6] __wr_after_init: test write rare functionality
` [PATCH 6/6] __wr_after_init: lkdtm test

grsecurity updated source code
 2018-12-18 14:11 UTC  (2+ messages)

10e9ae9fab ("gcc-plugins: Add STACKLEAK plugin for tracking .."): WARNING: can't dereference registers at (null) for ip entry_SYSCALL_64_after_hwframe
 2018-12-18  5:15 UTC 

[PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
 2018-12-18  3:58 UTC  (5+ messages)

[PATCH v9 RESEND 0/4] KASLR feature to randomize each loadable module
 2018-12-18  1:27 UTC  (8+ messages)

[PATCH v2 0/4] Don’t leave executable TLB entries to freed pages
 2018-12-18  1:02 UTC  (21+ messages)
` [PATCH v2 1/4] vmalloc: New flags for safe vfree on special perms
` [PATCH v2 2/4] modules: Add new special vfree flags
` [PATCH v2 3/4] bpf: switch to new vmalloc "
` [PATCH v2 4/4] x86/vmalloc: Add TLB efficient x86 arch_vunmap

[PATCH v2 0/3] [PATCH v2 0/3] Kernel Userspace Protection for Radix MMU
 2018-12-17  7:09 UTC  (5+ messages)
` [PATCH v2 1/3] powerpc/mm/radix: Use KUEP API "
` [PATCH v2 2/3] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()
` [PATCH v2 3/3] powerpc/64s: Implement KUAP for Radix MMU

[PATCH 4.4 53/88] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
 2018-12-14 12:00 UTC  (3+ messages)
` [PATCH 4.4 54/88] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 4.4 55/88] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec

Patch "x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 

Patch "x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 

Patch "x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 

[RFC PATCH v1 0/5] Add support for O_MAYEXEC
 2018-12-13 17:44 UTC  (31+ messages)
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
` [RFC PATCH v1 4/5] selftest/yama: Add tests for O_MAYEXEC enforcing
` [RFC PATCH v1 5/5] doc: Add documentation for Yama's open_mayexec_enforce

[PATCH V7 0/10] KVM: X86: Introducing ROE Protection Kernel Hardening
 2018-12-13 16:00 UTC  (13+ messages)
` [PATCH 01/10] KVM: State whether memory should be freed in kvm_free_memslot
` [PATCH 02/10] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions
` [PATCH 03/10] KVM: X86: Add helper function to convert SPTE to GFN
` [PATCH 04/10] KVM: Document Memory ROE
` [PATCH 05/10] KVM: Create architecture independent ROE skeleton
` [PATCH 06/10] KVM: X86: Enable ROE for x86
` [PATCH 07/10] KVM: Add support for byte granular memory ROE
` [PATCH 08/10] KVM: X86: Port ROE_MPROTECT_CHUNK to x86
` [PATCH 09/10] KVM: Add new exit reason For ROE violations
` [PATCH 10/10] KVM: Log ROE violations in system log
` RESEND "

[PATCH v3] ARM: smp: add support for per-task stack canaries
 2018-12-13  2:53 UTC  (6+ messages)
    ` [kbuild-all] "

[RFC v1] copy_{to,from}_user(): only inline when !__CHECKER__
 2018-12-09 22:08 UTC  (9+ messages)

dynamically allocating memory in the kernel
 2018-12-09  0:30 UTC  (4+ messages)

[PATCH 0/2] Don’t leave executable TLB entries to freed pages
 2018-12-07  3:06 UTC  (42+ messages)
` [PATCH 1/2] vmalloc: New flag for flush before releasing pages

[PATCH v2 1/1] stackleak: Register the 'stackleak_cleanup' pass before the '*free_cfg' pass
 2018-12-06 18:25 UTC  (2+ messages)

[PATCH v4 0/2] Documentation/admin-guide: introduce perf-security.rst file and extend perf_event_paranoid documentation
 2018-12-06 16:57 UTC  (8+ messages)
` [PATCH v4 1/2] Documentation/admin-guide: introduce perf-security.rst file

[PATCH 1/1] stackleak: Register the 'stackleak_cleanup' pass before the 'mach' pass
 2018-12-06 15:10 UTC  (7+ messages)

[RFC/RFT PATCH v2] ARM: smp: add support for per-task stack canaries
 2018-12-05 23:38 UTC  (7+ messages)

[PATCH 10/17] prmem: documentation
 2018-12-04 12:34 UTC  (13+ messages)

[PATCH v2 2/2] kbuild: descend into scripts/gcc-plugins/ via scripts/Makefile
 2018-12-01 14:56 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).