messages from 2018-11-30 08:42:05 to 2018-12-20 17:30:01 UTC [more...]
[RFC v2 PATCH 0/12] hardening: statically allocated protected memory
2018-12-20 17:30 UTC (16+ messages)
` [PATCH 01/12] x86_64: memset_user()
` [PATCH 02/12] __wr_after_init: linker section and label
` [PATCH 03/12] __wr_after_init: generic header
` [PATCH 04/12] __wr_after_init: x86_64: __wr_op
` [PATCH 05/12] __wr_after_init: x86_64: debug writes
` [PATCH 06/12] __wr_after_init: Documentation: self-protection
` [PATCH 07/12] __wr_after_init: lkdtm test
` [PATCH 08/12] rodata_test: refactor tests
` [PATCH 09/12] rodata_test: add verification for __wr_after_init
` [PATCH 10/12] __wr_after_init: test write rare functionality
` [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
` [PATCH 12/12] x86_64: __clear_user as case of __memset_user
[RFC PATCH 0/6] Process-local memory allocations
2018-12-19 23:00 UTC (4+ messages)
[RFC v1 PATCH 0/6] hardening: statically allocated protected memory
2018-12-19 22:50 UTC (16+ messages)
` [PATCH 1/6] __wr_after_init: linker section and label
` [PATCH 2/6] __wr_after_init: write rare for static allocation
` [PATCH 3/6] rodata_test: refactor tests
` [PATCH 4/6] rodata_test: add verification for __wr_after_init
` [PATCH 5/6] __wr_after_init: test write rare functionality
` [PATCH 6/6] __wr_after_init: lkdtm test
grsecurity updated source code
2018-12-18 14:11 UTC (2+ messages)
10e9ae9fab ("gcc-plugins: Add STACKLEAK plugin for tracking .."): WARNING: can't dereference registers at (null) for ip entry_SYSCALL_64_after_hwframe
2018-12-18 5:15 UTC
[PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
2018-12-18 3:58 UTC (5+ messages)
[PATCH v9 RESEND 0/4] KASLR feature to randomize each loadable module
2018-12-18 1:27 UTC (8+ messages)
[PATCH v2 0/4] Don’t leave executable TLB entries to freed pages
2018-12-18 1:02 UTC (21+ messages)
` [PATCH v2 1/4] vmalloc: New flags for safe vfree on special perms
` [PATCH v2 2/4] modules: Add new special vfree flags
` [PATCH v2 3/4] bpf: switch to new vmalloc "
` [PATCH v2 4/4] x86/vmalloc: Add TLB efficient x86 arch_vunmap
[PATCH v2 0/3] [PATCH v2 0/3] Kernel Userspace Protection for Radix MMU
2018-12-17 7:09 UTC (5+ messages)
` [PATCH v2 1/3] powerpc/mm/radix: Use KUEP API "
` [PATCH v2 2/3] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()
` [PATCH v2 3/3] powerpc/64s: Implement KUAP for Radix MMU
[PATCH 4.4 53/88] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
2018-12-14 12:00 UTC (3+ messages)
` [PATCH 4.4 54/88] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 4.4 55/88] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
Patch "x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}" has been added to the 4.4-stable tree
2018-12-13 19:13 UTC
Patch "x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
2018-12-13 19:13 UTC
Patch "x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
2018-12-13 19:13 UTC
[RFC PATCH v1 0/5] Add support for O_MAYEXEC
2018-12-13 17:44 UTC (31+ messages)
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
` [RFC PATCH v1 4/5] selftest/yama: Add tests for O_MAYEXEC enforcing
` [RFC PATCH v1 5/5] doc: Add documentation for Yama's open_mayexec_enforce
[PATCH V7 0/10] KVM: X86: Introducing ROE Protection Kernel Hardening
2018-12-13 16:00 UTC (13+ messages)
` [PATCH 01/10] KVM: State whether memory should be freed in kvm_free_memslot
` [PATCH 02/10] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions
` [PATCH 03/10] KVM: X86: Add helper function to convert SPTE to GFN
` [PATCH 04/10] KVM: Document Memory ROE
` [PATCH 05/10] KVM: Create architecture independent ROE skeleton
` [PATCH 06/10] KVM: X86: Enable ROE for x86
` [PATCH 07/10] KVM: Add support for byte granular memory ROE
` [PATCH 08/10] KVM: X86: Port ROE_MPROTECT_CHUNK to x86
` [PATCH 09/10] KVM: Add new exit reason For ROE violations
` [PATCH 10/10] KVM: Log ROE violations in system log
` RESEND "
[PATCH v3] ARM: smp: add support for per-task stack canaries
2018-12-13 2:53 UTC (6+ messages)
` [kbuild-all] "
[RFC v1] copy_{to,from}_user(): only inline when !__CHECKER__
2018-12-09 22:08 UTC (9+ messages)
dynamically allocating memory in the kernel
2018-12-09 0:30 UTC (4+ messages)
[PATCH 0/2] Don’t leave executable TLB entries to freed pages
2018-12-07 3:06 UTC (42+ messages)
` [PATCH 1/2] vmalloc: New flag for flush before releasing pages
[PATCH v2 1/1] stackleak: Register the 'stackleak_cleanup' pass before the '*free_cfg' pass
2018-12-06 18:25 UTC (2+ messages)
[PATCH v4 0/2] Documentation/admin-guide: introduce perf-security.rst file and extend perf_event_paranoid documentation
2018-12-06 16:57 UTC (8+ messages)
` [PATCH v4 1/2] Documentation/admin-guide: introduce perf-security.rst file
[PATCH 1/1] stackleak: Register the 'stackleak_cleanup' pass before the 'mach' pass
2018-12-06 15:10 UTC (7+ messages)
[RFC/RFT PATCH v2] ARM: smp: add support for per-task stack canaries
2018-12-05 23:38 UTC (7+ messages)
[PATCH 10/17] prmem: documentation
2018-12-04 12:34 UTC (13+ messages)
[PATCH v2 2/2] kbuild: descend into scripts/gcc-plugins/ via scripts/Makefile
2018-12-01 14:56 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).