kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2019-08-20 20:48:34 to 2019-10-07 12:41:00 UTC [more...]

[PATCH v5 00/12] S.A.R.A. a new stacked LSM
 2019-10-07 12:40 UTC  (6+ messages)
` [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching

[PATCH 1/2] mm: slub: init_on_free=1 should wipe freelist ptr for bulk allocations
 2019-10-07  9:16 UTC  (2+ messages)
` [PATCH 2/2] lib/test_meminit: add a kmem_cache_alloc_bulk() test

[PATCH v1 1/2] mm: slub: init_on_free=1 should wipe freelist ptr for bulk allocations
 2019-10-04 18:45 UTC  (3+ messages)
` [PATCH v1 2/2] lib/test_meminit: add a kmem_cache_alloc_bulk() test

How to get the crash dump if system hangs?
 2019-10-03 21:36 UTC  (4+ messages)

[PATCH v3] audit: Report suspicious O_CREAT usage
 2019-10-03 18:29 UTC  (2+ messages)

[PATCH v2] audit: Report suspicious O_CREAT usage
 2019-10-02 21:12 UTC  (2+ messages)

[PRE-REVIEW PATCH 00/16] Modernize the tasklet API
 2019-10-01 17:47 UTC  (27+ messages)
` [PRE-REVIEW PATCH 01/16] tasklet: Prepare to change tasklet callback argument type
` [PRE-REVIEW PATCH 02/16] crypto: ccp - Prepare to use the new tasklet API
` [PRE-REVIEW PATCH 03/16] mmc: renesas_sdhi: "
` [PRE-REVIEW PATCH 04/16] net: liquidio: "
` [PRE-REVIEW PATCH 05/16] chelsio: "
` [PRE-REVIEW PATCH 06/16] net: mvpp2: "
` [PRE-REVIEW PATCH 07/16] qed: "
` [PRE-REVIEW PATCH 08/16] isdn: "
` [PRE-REVIEW PATCH 09/16] scsi: pm8001: "
` [PRE-REVIEW PATCH 10/16] scsi: pmcraid: "
` [PRE-REVIEW PATCH 11/16] treewide: Globally replace tasklet_init() by tasklet_setup()
` [PRE-REVIEW PATCH 12/16] tasklet: Pass tasklet_struct pointer as .data in DECLARE_TASKLET
` [PRE-REVIEW PATCH 13/16] tasklet: Pass tasklet_struct pointer to callbacks unconditionally
` [PRE-REVIEW PATCH 14/16] tasklet: Remove the data argument from DECLARE_TASKLET() macros
` [PRE-REVIEW PATCH 15/16] tasklet: convert callbacks prototype for using struct tasklet_struct * arguments
` [PRE-REVIEW PATCH 16/16] tasklet: Add the new initialization function permanently

[PATCH] audit: Report suspicious O_CREAT usage
 2019-10-01  5:37 UTC  (9+ messages)

refactor tasklets to avoid unsigned long argument
 2019-09-29 16:37 UTC  (13+ messages)

[PATCH V2 0/2] string: Add stracpy and stracpy_pad
 2019-09-27 13:22 UTC  (11+ messages)
` [PATCH V2 1/2] string: Add stracpy and stracpy_pad mechanisms

Introduction and get involved
 2019-09-26 22:10 UTC  (4+ messages)

[PATCH 0/5] Add and use sizeof_member macro to bring uniformity
 2019-09-25  4:29 UTC  (10+ messages)
` [PATCH 1/5] linux/kernel.h: Add sizeof_member macro
` [PATCH 2/5] treewide: Use "
` [PATCH 3/5] MIPS: OCTEON: use sizeof_member macro instead of SIZEOF_FIELD
` [PATCH 4/5] linux/kernel.h: Remove FIELD_SIZEOF macro
` [PATCH 5/5] stddef.h: Remove sizeof_field macro

[PATCH 0/5] Add and use sizeof_member macro to bring uniformity
 2019-09-24 13:02 UTC  (7+ messages)
` [PATCH 1/5] linux/kernel.h: Add sizeof_member macro
` [PATCH 2/5] treewide: Use "
` [PATCH 3/5] MIPS: OCTEON: use sizeof_member macro instead of SIZEOF_FIELD
` [PATCH 4/5] linux/kernel.h: Remove FIELD_SIZEOF macro
` [PATCH 5/5] stddef.h: Remove sizeof_field macro

[PATCH 0/5] Add and use sizeof_member macro to bring uniformity
 2019-09-24 13:00 UTC  (7+ messages)
` [PATCH 1/5] linux/kernel.h: Add sizeof_member macro
` [PATCH 2/5] treewide: Use "
` [PATCH 3/5] MIPS: OCTEON: use sizeof_member macro instead of SIZEOF_FIELD
` [PATCH 4/5] linux/kernel.h: Remove FIELD_SIZEOF macro
` [PATCH 5/5] stddef.h: Remove sizeof_field macro

[PATCH v7 00/12] implement KASLR for powerpc/fsl_booke/32
 2019-09-24  5:52 UTC  (14+ messages)
` [PATCH v7 01/12] powerpc: unify definition of M_IF_NEEDED
` [PATCH v7 02/12] powerpc: move memstart_addr and kernstart_addr to init-common.c
` [PATCH v7 03/12] powerpc: introduce kernstart_virt_addr to store the kernel base
` [PATCH v7 04/12] powerpc/fsl_booke/32: introduce create_kaslr_tlb_entry() helper
` [PATCH v7 05/12] powerpc/fsl_booke/32: introduce reloc_kernel_entry() helper
` [PATCH v7 06/12] powerpc/fsl_booke/32: implement KASLR infrastructure
` [PATCH v7 07/12] powerpc/fsl_booke/32: randomize the kernel image offset
` [PATCH v7 08/12] powerpc/fsl_booke/kaslr: clear the original kernel if randomized
` [PATCH v7 09/12] powerpc/fsl_booke/kaslr: support nokaslr cmdline parameter
` [PATCH v7 10/12] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic
` [PATCH v7 11/12] powerpc/fsl_booke/kaslr: export offset in VMCOREINFO ELF notes
` [PATCH v7 12/12] powerpc/fsl_booke/32: Document KASLR implementation

[PATCH v7 0/2] Restrict xmon when kernel is locked down
 2019-09-17  7:20 UTC  (4+ messages)
` [PATCH v7 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v7 2/2] powerpc/xmon: Restrict when kernel is locked down

[PATCH v6 00/12] implement KASLR for powerpc/fsl_booke/32
 2019-09-14 14:28 UTC  (21+ messages)
` [PATCH v6 04/12] powerpc/fsl_booke/32: introduce create_tlb_entry() helper
` [PATCH v6 06/12] powerpc/fsl_booke/32: implement KASLR infrastructure

[PATCH v2 0/5] Add support for O_MAYEXEC
 2019-09-09 15:49 UTC  (45+ messages)
` [PATCH v2 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [PATCH v2 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [PATCH v2 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v2 4/5] selftest/exec: Add tests for O_MAYEXEC enforcing
` [PATCH v2 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl

[PATCH bpf-next v10 00/10] Landlock LSM: Toward unprivileged sandboxing
 2019-09-08 22:19 UTC  (6+ messages)
` [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode

[PATCH v9 00/11] x86: PIE support to extend KASLR randomization
 2019-09-06 23:22 UTC  (5+ messages)

CONFIG_HARDENED_USERCOPY
 2019-08-30 19:47 UTC  (4+ messages)

[PATCH v6 0/2] Restrict xmon when kernel is locked down
 2019-08-30  3:37 UTC  (3+ messages)
` [PATCH v6 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v6 2/2] powerpc/xmon: Restrict when kernel is locked down

[PATCH v2] powerpc/mm: Implement STRICT_MODULE_RWX
 2019-08-30  3:22 UTC  (3+ messages)

[PATCH RESEND v3] scripts/gcc-plugins: Add SPDX header for files without
 2019-08-29 17:48 UTC  (2+ messages)

[PATCH v5 0/2] Restrict xmon when kernel is locked down
 2019-08-29 12:38 UTC  (7+ messages)
` [PATCH v5 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
` [PATCH v5 2/2] powerpc/xmon: Restrict when kernel is locked down

[PATCH RESEND] scripts/gcc-plugins: Add SPDX header for files without
 2019-08-24 15:27 UTC 

[PATCH] scripts/gcc-plugins: Add SPDX header for files without
 2019-08-24 15:20 UTC 

[RFC v2] security hardening: block write to read_only pages of a target process
 2019-08-24  6:31 UTC 

[RFC] security hardening: block write to read_only pages of a target process
 2019-08-23 14:09 UTC  (2+ messages)

[RFC] Refuse write to read_only pages of a target process. Target process is not a current process. It is foreign process. Typically debuggers,such as gdb, write to read-only code[text] sections of target. kernel hardening configuration option will stop attacks modifying code or jump tables. New logic denies to accept page fault caused by page protection violation
 2019-08-23 11:11 UTC 

[PATCH] latent_entropy: make builtin_frame_address implicit
 2019-08-20 20:48 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).