kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2019-10-10 10:32:38 to 2019-10-31 17:01:51 UTC [more...]

[PATCH 00/18] add support for Clang's Shadow Call Stack
 2019-10-31 16:46 UTC  (126+ messages)
` [PATCH 01/18] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings
` [PATCH 02/18] arm64/lib: copy_page: avoid x18 register in assembler code
` [PATCH 03/18] arm64: kvm: stop treating register x18 as caller save
` [PATCH 04/18] arm64: kernel: avoid x18 as an arbitrary temp register
` [PATCH 05/18] arm64: kbuild: reserve reg x18 from general allocation by the compiler
` [PATCH 06/18] add support for Clang's Shadow Call Stack (SCS)
` [PATCH 07/18] scs: add accounting
` [PATCH 08/18] scs: add support for stack usage debugging
` [PATCH 09/18] trace: disable function graph tracing with SCS
` [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES
` [PATCH 11/18] kprobes: disable kretprobes with SCS
` [PATCH 12/18] arm64: reserve x18 only with Shadow Call Stack
` [PATCH 13/18] arm64: preserve x18 when CPU is suspended
` [PATCH 14/18] arm64: efi: restore x18 if it was corrupted
` [PATCH 15/18] arm64: vdso: disable Shadow Call Stack
` [PATCH 16/18] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES
` [PATCH 17/18] arm64: disable SCS for hypervisor code
` [PATCH 18/18] arm64: implement Shadow Call Stack
` [PATCH v2 00/17] add support for Clang's "
  ` [PATCH v2 01/17] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v2 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v2 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v2 04/17] arm64: kernel: avoid x18 as an arbitrary temp register
  ` [PATCH v2 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v2 06/17] scs: add accounting
  ` [PATCH v2 07/17] scs: add support for stack usage debugging
  ` [PATCH v2 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v2 09/17] arm64: disable function graph tracing with SCS
  ` [PATCH v2 10/17] arm64: disable kretprobes "
  ` [PATCH v2 11/17] arm64: reserve x18 from general allocation "
  ` [PATCH v2 12/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v2 13/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v2 14/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v2 15/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES
  ` [PATCH v2 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v2 17/17] arm64: implement Shadow Call Stack
` [PATCH v3 00/17] add support for Clang's "
  ` [PATCH v3 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v3 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v3 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v3 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
  ` [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v3 06/17] scs: add accounting
  ` [PATCH v3 07/17] scs: add support for stack usage debugging
  ` [PATCH v3 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v3 09/17] arm64: kprobes: fix kprobes "
  ` [PATCH v3 10/17] arm64: disable kretprobes with SCS
  ` [PATCH v3 11/17] arm64: disable function graph tracing "
  ` [PATCH v3 12/17] arm64: reserve x18 from general allocation "
  ` [PATCH v3 13/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v3 14/17] arm64: efi: restore x18 if it was corrupted

[PATCH bpf-next v12 0/7] Landlock LSM
 2019-10-31 16:44 UTC  (8+ messages)
` [PATCH bpf-next v12 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v12 2/7] landlock: Add the management of domains
` [PATCH bpf-next v12 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v12 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v12 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v5 0/5] Implement STRICT_MODULE_RWX for powerpc
 2019-10-31  0:09 UTC  (12+ messages)
` [PATCH v5 1/5] powerpc/mm: Implement set_memory() routines
` [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
` [PATCH v5 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
` [PATCH v5 4/5] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
` [PATCH v5 5/5] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig

[PATCH v4 0/6] lib/string: Add strscpy_pad() function
 2019-10-30 19:16 UTC  (4+ messages)
` [PATCH v4 2/6] kselftest: Add test runner creation script

[PATCH v4 0/4] Implement STRICT_MODULE_RWX for powerpc
 2019-10-30 18:43 UTC  (8+ messages)
` [PATCH v4 1/4] powerpc/mm: Implement set_memory() routines
` [PATCH v4 2/4] powerpc/kprobes: Mark newly allocated probes as RO
` [PATCH v4 3/4] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
` [PATCH v4 4/4] powerpc: Enable STRICT_MODULE_RWX

[PATCH V2] kernel: dma: contigous: Make CMA parameters __initdata/__initconst
 2019-10-30 18:12 UTC  (3+ messages)

[PATCH bpf-next v11 0/7] Landlock LSM
 2019-10-30 14:03 UTC  (10+ messages)
` [PATCH bpf-next v11 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v11 2/7] landlock: Add the management of domains
` [PATCH bpf-next v11 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v11 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v11 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v11 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v11 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v7 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
 2019-10-30 12:14 UTC  (2+ messages)

[PRE-REVIEW PATCH 00/16] Modernize the tasklet API
 2019-10-30  8:20 UTC  (9+ messages)
` [PRE-REVIEW PATCH 11/16] treewide: Globally replace tasklet_init() by tasklet_setup()

[PATCH v9 00/11] x86: PIE support to extend KASLR randomization
 2019-10-29 21:31 UTC  (11+ messages)
` [PATCH v9 08/11] x86/boot/64: Adapt assembly for PIE support
` [PATCH v9 10/11] x86/paravirt: "
` [PATCH v9 11/11] x86/alternatives: "

How to get the crash dump if system hangs?
 2019-10-28 19:22 UTC  (11+ messages)

[PATCH v7 00/12] implement KASLR for powerpc/fsl_booke/32
 2019-10-22 23:22 UTC  (8+ messages)

How to get the crash dump if system hangs?
 2019-10-21 10:22 UTC  (3+ messages)

How to get the crash dump if system hangs?
 2019-10-20 19:31 UTC 

[PATCH] slab: Redefine ZERO_SIZE_PTR to include ERR_PTR range
 2019-10-20 15:38 UTC  (6+ messages)

[PATCH] kernel: dma: Make CMA boot parameters __ro_after_init
 2019-10-19  5:37 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).