kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2018-12-12 06:30:56 to 2019-01-15 17:02:42 UTC [more...]

[PATCH v1 01/06]: Extending objtool for PIC
 2019-01-15 17:02 UTC 

[RFC PATCH v7 00/16] Add support for eXclusive Page Frame Ownership
 2019-01-11 23:25 UTC  (31+ messages)
` [RFC PATCH v7 01/16] mm: add MAP_HUGETLB support to vm_mmap
` [RFC PATCH v7 02/16] x86: always set IF before oopsing from page fault
` [RFC PATCH v7 03/16] mm, x86: Add support for eXclusive Page Frame Ownership (XPFO)
` [RFC PATCH v7 04/16] swiotlb: Map the buffer if it was unmapped by XPFO
` [RFC PATCH v7 05/16] arm64/mm: Add support for XPFO
` [RFC PATCH v7 06/16] xpfo: add primitives for mapping underlying memory
` [RFC PATCH v7 07/16] arm64/mm, xpfo: temporarily map dcache regions
` [RFC PATCH v7 08/16] arm64/mm: disable section/contiguous mappings if XPFO is enabled
` [RFC PATCH v7 09/16] mm: add a user_virt_to_phys symbol
` [RFC PATCH v7 10/16] lkdtm: Add test for XPFO
` [RFC PATCH v7 11/16] mm, x86: omit TLB flushing by default for XPFO page table modifications
` [RFC PATCH v7 12/16] xpfo, mm: remove dependency on CONFIG_PAGE_EXTENSION
` [RFC PATCH v7 13/16] xpfo, mm: optimize spinlock usage in xpfo_kunmap
` [RFC PATCH v7 14/16] EXPERIMENTAL: xpfo, mm: optimize spin lock usage in xpfo_kmap
` [RFC PATCH v7 15/16] xpfo, mm: Fix hang when booting with "xpfotlbflush"
` [RFC PATCH v7 16/16] xpfo, mm: Defer TLB flushes for non-current CPUs (x86 only)

[PATCH 1/2] kbuild: clean up hostprogs rules with hostld_flags and hostld_libs
 2019-01-11 17:20 UTC  (4+ messages)
` [PATCH 2/2] kbuild: simplify GCC plugin build rules

[PATCH] usercopy: skip the check if not a real usercopy
 2019-01-11  1:52 UTC  (9+ messages)

[PATCH v3] ARM: smp: add support for per-task stack canaries
 2019-01-09 21:37 UTC  (8+ messages)
    ` [kbuild-all] "

[RFC PATCH v1 0/5] Add support for O_MAYEXEC
 2019-01-09 13:41 UTC  (35+ messages)
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
` [RFC PATCH v1 4/5] selftest/yama: Add tests for O_MAYEXEC enforcing
` [RFC PATCH v1 5/5] doc: Add documentation for Yama's open_mayexec_enforce

[PATCH AUTOSEL 4.19 17/97] crypto: ecc - regularize scalar for scalar multiplication
 2019-01-08 19:28 UTC 

[PATCH AUTOSEL 4.20 020/117] crypto: ecc - regularize scalar for scalar multiplication
 2019-01-08 19:24 UTC 

[PATCH V8 0/11] KVM: X86: Introducing ROE Protection Kernel Hardening
 2019-01-06 19:23 UTC  (12+ messages)
` [PATCH V8 01/11] KVM: State whether memory should be freed in kvm_free_memslot
` [PATCH V8 02/11] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions
` [PATCH V8 03/11] KVM: X86: Add helper function to convert SPTE to GFN
` [PATCH V8 04/11] KVM: Document Memory ROE
` [PATCH V8 05/11] KVM: Create architecture independent ROE skeleton
` [PATCH V8 06/11] KVM: X86: Enable ROE for x86
` [PATCH V8 07/11] KVM: Add support for byte granular memory ROE
` [PATCH V8 08/11] KVM: X86: Port ROE_MPROTECT_CHUNK to x86
` [PATCH V8 09/11] KVM: Add new exit reason For ROE violations
` [PATCH V8 10/11] KVM: Log ROE violations in system log
` [PATCH V8 11/11] KVM: ROE: Store protected chunks in red black tree

[PATCH 4/4] locking/refcount: Add refcount_t API kernel-doc comments
 2018-12-26  8:58 UTC 

[RFC v2 PATCH 0/12] hardening: statically allocated protected memory
 2018-12-23  2:28 UTC  (26+ messages)
` [PATCH 01/12] x86_64: memset_user()
` [PATCH 02/12] __wr_after_init: linker section and label
` [PATCH 03/12] __wr_after_init: generic header
` [PATCH 04/12] __wr_after_init: x86_64: __wr_op
` [PATCH 05/12] __wr_after_init: x86_64: debug writes
` [PATCH 06/12] __wr_after_init: Documentation: self-protection
` [PATCH 07/12] __wr_after_init: lkdtm test
` [PATCH 08/12] rodata_test: refactor tests
` [PATCH 09/12] rodata_test: add verification for __wr_after_init
` [PATCH 10/12] __wr_after_init: test write rare functionality
` [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
` [PATCH 12/12] x86_64: __clear_user as case of __memset_user

grsecurity updated source code
 2018-12-22 11:38 UTC  (4+ messages)

[PATCH v2 0/4] Don’t leave executable TLB entries to freed pages
 2018-12-22 11:12 UTC  (25+ messages)
` [PATCH v2 1/4] vmalloc: New flags for safe vfree on special perms
` [PATCH v2 2/4] modules: Add new special vfree flags
` [PATCH v2 4/4] x86/vmalloc: Add TLB efficient x86 arch_vunmap

[RFC v1 0/4] static analysis of copy_to_user()
 2018-12-21 22:47 UTC  (6+ messages)
` [RFC v1 1/4] expression.h: update comment to include other cast types
` [RFC v1 2/4] move name-based analysis before linearization
` [RFC v1 3/4] add a check for copy_to_user() address spaces
` [RFC v1 4/4] check copy_to_user() sizes

[PATCH 01/12] x86_64: memset_user()
 2018-12-21 21:54 UTC  (23+ messages)
` [PATCH 02/12] __wr_after_init: linker section and label
` [PATCH 03/12] __wr_after_init: generic functionality
` [PATCH 04/12] __wr_after_init: debug writes
` [PATCH 05/12] __wr_after_init: x86_64: __wr_op
` [PATCH 06/12] __wr_after_init: Documentation: self-protection
` [PATCH 07/12] __wr_after_init: lkdtm test
` [PATCH 08/12] rodata_test: refactor tests
` [PATCH 09/12] rodata_test: add verification for __wr_after_init
` [PATCH 10/12] __wr_after_init: test write rare functionality
` [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
` [PATCH 12/12] x86_64: __clear_user as case of __memset_user

[PATCH V7 0/10] KVM: X86: Introducing ROE Protection Kernel Hardening
 2018-12-21 14:05 UTC  (3+ messages)

10e9ae9fab ("gcc-plugins: Add STACKLEAK plugin for tracking .."): WARNING: can't dereference registers at (null) for ip entry_SYSCALL_64_after_hwframe
 2018-12-20 20:18 UTC  (2+ messages)

[RFC PATCH 0/6] Process-local memory allocations
 2018-12-19 23:00 UTC  (4+ messages)

[RFC v1 PATCH 0/6] hardening: statically allocated protected memory
 2018-12-19 22:50 UTC  (5+ messages)
` [PATCH 2/6] __wr_after_init: write rare for static allocation

[PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
 2018-12-18  3:58 UTC  (5+ messages)

[PATCH v9 RESEND 0/4] KASLR feature to randomize each loadable module
 2018-12-18  1:27 UTC  (8+ messages)

[PATCH v2 0/3] [PATCH v2 0/3] Kernel Userspace Protection for Radix MMU
 2018-12-17  7:09 UTC  (3+ messages)
` [PATCH v2 2/3] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()

[PATCH 4.4 53/88] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
 2018-12-14 12:00 UTC  (3+ messages)
` [PATCH 4.4 54/88] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 4.4 55/88] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec

Patch "x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 

Patch "x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 

Patch "x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.4-stable tree
 2018-12-13 19:13 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).