messages from 2019-08-01 20:15:04 to 2019-09-09 15:49:58 UTC [more...]
[PATCH v2 0/5] Add support for O_MAYEXEC
2019-09-09 15:49 UTC (45+ messages)
` [PATCH v2 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [PATCH v2 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [PATCH v2 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v2 4/5] selftest/exec: Add tests for O_MAYEXEC enforcing
` [PATCH v2 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
[PATCH bpf-next v10 00/10] Landlock LSM: Toward unprivileged sandboxing
2019-09-08 22:19 UTC (10+ messages)
` [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode
[PATCH v7 0/2] Restrict xmon when kernel is locked down
2019-09-07 6:11 UTC (3+ messages)
` [PATCH v7 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v7 2/2] powerpc/xmon: Restrict when kernel is locked down
[PATCH v9 00/11] x86: PIE support to extend KASLR randomization
2019-09-06 23:22 UTC (25+ messages)
` [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
` [PATCH v9 04/11] x86/entry/64: "
` [PATCH v9 08/11] x86/boot/64: "
` [PATCH v9 10/11] x86/paravirt: "
` [PATCH v9 11/11] x86/alternatives: "
CONFIG_HARDENED_USERCOPY
2019-08-30 19:47 UTC (4+ messages)
[PATCH v6 0/2] Restrict xmon when kernel is locked down
2019-08-30 3:37 UTC (3+ messages)
` [PATCH v6 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v6 2/2] powerpc/xmon: Restrict when kernel is locked down
[PATCH v2] powerpc/mm: Implement STRICT_MODULE_RWX
2019-08-30 3:22 UTC (3+ messages)
refactor tasklets to avoid unsigned long argument
2019-08-29 18:35 UTC (12+ messages)
[PATCH RESEND v3] scripts/gcc-plugins: Add SPDX header for files without
2019-08-29 17:48 UTC (2+ messages)
[PATCH v5 0/2] Restrict xmon when kernel is locked down
2019-08-29 12:38 UTC (7+ messages)
` [PATCH v5 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v5 2/2] powerpc/xmon: Restrict when kernel is locked down
[PATCH v6 00/12] implement KASLR for powerpc/fsl_booke/32
2019-08-29 6:26 UTC (29+ messages)
` [PATCH v6 01/12] powerpc: unify definition of M_IF_NEEDED
` [PATCH v6 02/12] powerpc: move memstart_addr and kernstart_addr to init-common.c
` [PATCH v6 03/12] powerpc: introduce kernstart_virt_addr to store the kernel base
` [PATCH v6 04/12] powerpc/fsl_booke/32: introduce create_tlb_entry() helper
` [PATCH v6 05/12] powerpc/fsl_booke/32: introduce reloc_kernel_entry() helper
` [PATCH v6 06/12] powerpc/fsl_booke/32: implement KASLR infrastructure
` [PATCH v6 07/12] powerpc/fsl_booke/32: randomize the kernel image offset
` [PATCH v6 08/12] powerpc/fsl_booke/kaslr: clear the original kernel if randomized
` [PATCH v6 09/12] powerpc/fsl_booke/kaslr: support nokaslr cmdline parameter
` [PATCH v6 10/12] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic
` [PATCH v6 11/12] powerpc/fsl_booke/kaslr: export offset in VMCOREINFO ELF notes
` [PATCH v6 12/12] powerpc/fsl_booke/32: Document KASLR implementation
[PATCH RESEND] scripts/gcc-plugins: Add SPDX header for files without
2019-08-24 15:27 UTC
[PATCH] scripts/gcc-plugins: Add SPDX header for files without
2019-08-24 15:20 UTC
[RFC v2] security hardening: block write to read_only pages of a target process
2019-08-24 6:31 UTC
[RFC] security hardening: block write to read_only pages of a target process
2019-08-23 14:09 UTC (2+ messages)
[RFC] Refuse write to read_only pages of a target process. Target process is not a current process. It is foreign process. Typically debuggers,such as gdb, write to read-only code[text] sections of target. kernel hardening configuration option will stop attacks modifying code or jump tables. New logic denies to accept page fault caused by page protection violation
2019-08-23 11:11 UTC
[PATCH] latent_entropy: make builtin_frame_address implicit
2019-08-20 20:48 UTC
[PATCH] latent_entropy: make builtin_frame_address implicit
2019-08-20 15:23 UTC (2+ messages)
[RFC PATCH v4 0/2] Restrict xmon when kernel is locked down
2019-08-15 7:52 UTC (4+ messages)
` [RFC PATCH v4 1/2] powerpc/xmon: Allow listing active breakpoints in read-only mode
` [RFC PATCH v4 2/2] powerpc/xmon: Restrict when kernel is locked down
[PATCH] Documentation patch (gcc-plugins kernel)
2019-08-14 11:29 UTC (2+ messages)
[PATCH] floppy: fix usercopy direction
2019-08-13 7:50 UTC (8+ messages)
` "
[PATCH] gcc-plugins: Enable error message print
2019-08-13 15:00 UTC (2+ messages)
[PATCH v5 00/10] implement KASLR for powerpc/fsl_booke/32
2019-08-08 8:39 UTC (27+ messages)
` [PATCH v5 01/10] powerpc: unify definition of M_IF_NEEDED
` [PATCH v5 02/10] powerpc: move memstart_addr and kernstart_addr to init-common.c
` [PATCH v5 03/10] powerpc: introduce kimage_vaddr to store the kernel base
` [PATCH v5 04/10] powerpc/fsl_booke/32: introduce create_tlb_entry() helper
` [PATCH v5 05/10] powerpc/fsl_booke/32: introduce reloc_kernel_entry() helper
` [PATCH v5 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure
` [PATCH v5 07/10] powerpc/fsl_booke/32: randomize the kernel image offset
` [PATCH v5 08/10] powerpc/fsl_booke/kaslr: clear the original kernel if randomized
` [PATCH v5 09/10] powerpc/fsl_booke/kaslr: support nokaslr cmdline parameter
` [PATCH v5 10/10] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic
[PATCH v4 00/10] implement KASLR for powerpc/fsl_booke/32
2019-08-07 3:22 UTC (17+ messages)
` [PATCH v4 01/10] powerpc: unify definition of M_IF_NEEDED
` [PATCH v4 02/10] powerpc: move memstart_addr and kernstart_addr to init-common.c
` [PATCH v4 03/10] powerpc: introduce kimage_vaddr to store the kernel base
` [PATCH v4 04/10] powerpc/fsl_booke/32: introduce create_tlb_entry() helper
` [PATCH v4 05/10] powerpc/fsl_booke/32: introduce reloc_kernel_entry() helper
` [PATCH v4 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure
` [PATCH v4 07/10] powerpc/fsl_booke/32: randomize the kernel image offset
` [PATCH v4 08/10] powerpc/fsl_booke/kaslr: clear the original kernel if randomized
` [PATCH v4 09/10] powerpc/fsl_booke/kaslr: support nokaslr cmdline parameter
` [PATCH v4 10/10] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic
[RFC PATCH v1 0/5] Add support for O_MAYEXEC
2019-08-06 16:40 UTC (5+ messages)
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
[RFC PATCH v3] powerpc/xmon: Restrict when kernel is locked down
2019-08-06 11:48 UTC (2+ messages)
[PATCH v3 00/10] implement KASLR for powerpc/fsl_booke/32
2019-08-05 5:40 UTC (7+ messages)
` [PATCH v3 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure
[RFC PATCH v2] powerpc/xmon: restrict when kernel is locked down
2019-08-03 19:04 UTC (7+ messages)
Hello Kernel Hardening
2019-08-01 20:25 UTC (5+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).