kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2019-01-24 03:15:00 to 2019-02-11 23:27:47 UTC [more...]

[RFC PATCH v4 00/12] hardening: statically allocated protected memory
 2019-02-11 23:27 UTC  (11+ messages)
` [RFC PATCH v4 01/12] __wr_after_init: Core and default arch
` [RFC PATCH v4 02/12] __wr_after_init: x86_64: memset_user()
` [RFC PATCH v4 03/12] __wr_after_init: x86_64: randomize mapping offset
` [RFC PATCH v4 04/12] __wr_after_init: x86_64: enable
` [RFC PATCH v4 05/12] __wr_after_init: arm64: memset_user()
` [RFC PATCH v4 06/12] __wr_after_init: arm64: enable
` [RFC PATCH v4 07/12] __wr_after_init: Documentation: self-protection
` [RFC PATCH v4 08/12] __wr_after_init: lkdtm test
` [RFC PATCH v4 09/12] __wr_after_init: rodata_test: refactor tests
` [RFC PATCH v4 10/12] __wr_after_init: rodata_test: test __wr_after_init

[PATCH v2 00/20] Merge text_poke fixes and executable lockdowns
 2019-02-11 22:59 UTC  (55+ messages)
` [PATCH v2 01/20] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
` [PATCH v2 02/20] x86/jump_label: Use text_poke_early() during early init
` [PATCH v2 03/20] x86/mm: temporary mm struct
` [PATCH v2 04/20] fork: provide a function for copying init_mm
` [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
` [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
` [PATCH v2 07/20] x86/kgdb: avoid redundant comparison of patched code
` [PATCH v2 08/20] x86/ftrace: set trampoline pages as executable
` [PATCH v2 09/20] x86/kprobes: instruction pages initialization enhancements
` [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
` [PATCH v2 11/20] x86/jump-label: remove support for custom poker
` [PATCH v2 12/20] x86/alternative: Remove the return value of text_poke_*()
` [PATCH v2 13/20] Add set_alias_ function and x86 implementation
` [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
` [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
` [PATCH v2 16/20] modules: Use vmalloc special flag
` [PATCH v2 17/20] bpf: "
` [PATCH v2 18/20] x86/ftrace: "
` [PATCH v2 19/20] x86/kprobes: "
` [PATCH v2 20/20] x86/alternative: comment about module removal races

[RFC PATCH] Early version of thread stack randomization
 2019-02-11 15:54 UTC  (16+ messages)
` [RFC PATCH] x86/entry/64: randomize kernel stack offset upon system call

[PATCH v3 0/3] admin-guide: extend perf-security with resource control, data categories and privileged users
 2019-02-11 14:58 UTC  (6+ messages)
` [PATCH v3 1/4] perf-security: document perf_events/Perf resource control
` [PATCH v3 2/4] perf-security: document collected perf_events/Perf data categories
` [PATCH v3 3/4] perf-security: elaborate on perf_events/Perf privileged users
` [PATCH v3 4/4] perf-security: wrap paragraphs on 72 columns

[PATCH v2 0/3] admin-guide: extend perf-security with resource control, data categories and privileged users
 2019-02-11 14:22 UTC  (9+ messages)
` [PATCH v2 1/4] perf-security: document perf_events/Perf resource control
` [PATCH v2 2/4] perf-security: document collected perf_events/Perf data categories
` [PATCH v2 3/4] perf-security: elaborate on perf_events/Perf privileged users
` [PATCH v2 4/4] perf-security: wrap paragraphs on 72 columns

classes of methods for gaining access to kernel memory
 2019-02-10 11:12 UTC 

[PATCH 0/3] Minor bug fixes to leaking_addresses.pl
 2019-02-09  6:01 UTC  (6+ messages)
` [PATCH 1/3] leaking_addresses: Fix calls to dprint
` [PATCH 2/3] leaking_addresses: Completely remove --version flag
` [PATCH 3/3] leaking_addresses: Expand tilde in output file name

[PATCH v6 00/27] x86: PIE support and option to extend KASLR randomization
 2019-02-07 23:55 UTC  (53+ messages)
` [PATCH v6 01/27] x86/crypto: Adapt assembly for PIE support
` [PATCH v6 02/27] x86: Use symbol name in jump table "
` [PATCH v6 03/27] x86: Add macro to get symbol address "
` [PATCH v6 04/27] x86: relocate_kernel - Adapt assembly "
` [PATCH v6 05/27] x86/entry/64: "
` [PATCH v6 06/27] x86: pm-trace - "
` [PATCH v6 07/27] x86/CPU: "
` [PATCH v6 08/27] x86/acpi: "
` [PATCH v6 09/27] x86/boot/64: "
` [PATCH v6 10/27] x86/power/64: "
` [PATCH v6 11/27] x86/paravirt: "
` [PATCH v6 12/27] x86/alternatives: "
` [PATCH v6 13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled
` [PATCH v6 14/27] x86/percpu: Adapt percpu for PIE support
` [PATCH v6 15/27] compiler: Option to default to hidden symbols
` [PATCH v6 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
` [PATCH v6 17/27] x86/relocs: Handle PIE relocations
` [PATCH v6 18/27] xen: Adapt assembly for PIE support
` [PATCH v6 19/27] kvm: "
` [PATCH v6 20/27] x86: Support global stack cookie
` [PATCH v6 21/27] x86/ftrace: Adapt function tracing for PIE support
` [PATCH v6 22/27] x86/modules: Add option to start module section after kernel
` [PATCH v6 23/27] x86/modules: Adapt module loading for PIE support
` [PATCH v6 24/27] x86/mm: Make the x86 GOT read-only
` [PATCH v6 25/27] x86/pie: Add option to build the kernel as PIE
` [PATCH v6 26/27] x86/relocs: Add option to generate 64-bit relocations
` [PATCH v6 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB

[PATCH 00/17] Merge text_poke fixes and executable lockdowns
 2019-02-07 18:20 UTC  (13+ messages)
` [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
` [PATCH 08/17] x86/ftrace: set trampoline pages as executable
` [PATCH 16/17] Plug in new special vfree flag

[PATCH v1 0/3] admin-guide: extend perf-security with resource control, data categories and privileged users
 2019-02-07 13:14 UTC  (8+ messages)
` [PATCH v1 1/3] perf-security: document perf_events/Perf resource control
` [PATCH v1 2/3] perf-security: document collected perf_events/Perf data categories
` [PATCH v1 3/3] perf-security: document perf_events/Perf resource control

[PATCH v2] KVM: x86: Fix single-step debugging
 2019-02-05 22:55 UTC  (6+ messages)

[PATCH] mm: Prevent mapping slab pages to userspace
 2019-01-31  6:03 UTC  (8+ messages)

ARM64 suggestion: reduce the compat address limit (currently 0x100000000)?
 2019-01-30 19:34 UTC  (3+ messages)

[PATCH] mm: Prevent mapping typed pages to userspace
 2019-01-30 12:01 UTC  (3+ messages)

[PATCH] tty: ldisc: add sysctl to prevent autoloading of ldiscs
 2019-01-30  8:28 UTC  (3+ messages)

[PATCH 0/3] gcc-plugins: Introduce stackinit plugin
 2019-01-29  0:12 UTC  (10+ messages)
` [PATCH 1/3] treewide: Lift switch variables out of switches
    ` [Intel-gfx] "

[PATCH v2 0/3] [PATCH v2 0/3] Kernel Userspace Protection for Radix MMU
 2019-01-25 11:45 UTC  (4+ messages)
` [PATCH v2 2/3] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()

[PATCH 4.19 026/106] crypto: ecc - regularize scalar for scalar multiplication
 2019-01-24 19:19 UTC 

[PATCH 4.20 032/127] crypto: ecc - regularize scalar for scalar multiplication
 2019-01-24 19:19 UTC 

[RFC v1 0/4] static analysis of copy_to_user()
 2019-01-24  3:15 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).