Kernel-hardening archive on lore.kernel.org
 help / color / Atom feed
[PATCH v5 0/5] Implement STRICT_MODULE_RWX for powerpc
 2019-11-02 10:45 UTC  (14+ messages) - mbox.gz / Atom
` [PATCH v5 1/5] powerpc/mm: Implement set_memory() routines
` [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
` [PATCH v5 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
` [PATCH v5 4/5] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
` [PATCH v5 5/5] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig

How to get the crash dump if system hangs?
 2019-11-02  5:42 UTC  (4+ messages) - mbox.gz / Atom

[PATCH 00/18] add support for Clang's Shadow Call Stack
 2019-11-01 22:36 UTC  (162+ messages) - mbox.gz / Atom
` [PATCH 03/18] arm64: kvm: stop treating register x18 as caller save
` [PATCH 05/18] arm64: kbuild: reserve reg x18 from general allocation by the compiler
` [PATCH 06/18] add support for Clang's Shadow Call Stack (SCS)
` [PATCH 09/18] trace: disable function graph tracing with SCS
` [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES
` [PATCH 11/18] kprobes: disable kretprobes with SCS
` [PATCH 12/18] arm64: reserve x18 only with Shadow Call Stack
` [PATCH 13/18] arm64: preserve x18 when CPU is suspended
` [PATCH 14/18] arm64: efi: restore x18 if it was corrupted
` [PATCH 16/18] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES
` [PATCH 18/18] arm64: implement Shadow Call Stack
` [PATCH v2 00/17] add support for Clang's "
  ` [PATCH v2 01/17] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v2 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v2 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v2 04/17] arm64: kernel: avoid x18 as an arbitrary temp register
  ` [PATCH v2 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v2 06/17] scs: add accounting
  ` [PATCH v2 07/17] scs: add support for stack usage debugging
  ` [PATCH v2 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v2 09/17] arm64: disable function graph tracing with SCS
  ` [PATCH v2 10/17] arm64: disable kretprobes "
  ` [PATCH v2 11/17] arm64: reserve x18 from general allocation "
  ` [PATCH v2 12/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v2 13/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v2 14/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v2 15/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES
  ` [PATCH v2 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v2 17/17] arm64: implement Shadow Call Stack
` [PATCH v3 00/17] add support for Clang's "
  ` [PATCH v3 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v3 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v3 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v3 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
  ` [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v3 06/17] scs: add accounting
  ` [PATCH v3 07/17] scs: add support for stack usage debugging
  ` [PATCH v3 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v3 09/17] arm64: kprobes: fix kprobes "
  ` [PATCH v3 10/17] arm64: disable kretprobes with SCS
  ` [PATCH v3 11/17] arm64: disable function graph tracing "
  ` [PATCH v3 12/17] arm64: reserve x18 from general allocation "
  ` [PATCH v3 13/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v3 14/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v3 15/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v3 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v3 17/17] arm64: implement Shadow Call Stack
` [PATCH v4 00/17] add support for Clang's "
  ` [PATCH v4 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v4 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
  ` [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v4 06/17] scs: add accounting
  ` [PATCH v4 07/17] scs: add support for stack usage debugging
  ` [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v4 09/17] arm64: kprobes: fix kprobes "
  ` [PATCH v4 10/17] arm64: disable kretprobes with SCS
  ` [PATCH v4 11/17] arm64: disable function graph tracing "
  ` [PATCH v4 12/17] arm64: reserve x18 from general allocation "
  ` [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v4 15/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v4 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v4 17/17] arm64: implement Shadow Call Stack

[PATCH bpf-next v12 0/7] Landlock LSM
 2019-10-31 16:44 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH bpf-next v12 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v12 2/7] landlock: Add the management of domains
` [PATCH bpf-next v12 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v12 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v12 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v4 0/6] lib/string: Add strscpy_pad() function
 2019-10-30 19:16 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH v4 2/6] kselftest: Add test runner creation script

[PATCH v4 0/4] Implement STRICT_MODULE_RWX for powerpc
 2019-10-30 18:43 UTC  (4+ messages) - mbox.gz / Atom

[PATCH V2] kernel: dma: contigous: Make CMA parameters __initdata/__initconst
 2019-10-30 18:12 UTC  (3+ messages) - mbox.gz / Atom

[PATCH bpf-next v11 0/7] Landlock LSM
 2019-10-30 14:03 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH bpf-next v11 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v11 2/7] landlock: Add the management of domains
` [PATCH bpf-next v11 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v11 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v11 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v11 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v11 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v7 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
 2019-10-30 12:14 UTC  (2+ messages) - mbox.gz / Atom

[PRE-REVIEW PATCH 00/16] Modernize the tasklet API
 2019-10-30  8:20 UTC  (5+ messages) - mbox.gz / Atom

[PATCH v9 00/11] x86: PIE support to extend KASLR randomization
 2019-10-29 21:31 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v9 08/11] x86/boot/64: Adapt assembly for PIE support
` [PATCH v9 10/11] x86/paravirt: "
` [PATCH v9 11/11] x86/alternatives: "

How to get the crash dump if system hangs?
 2019-10-28 19:22 UTC  (11+ messages) - mbox.gz / Atom

[PATCH v7 00/12] implement KASLR for powerpc/fsl_booke/32
 2019-10-22 23:22 UTC  (8+ messages) - mbox.gz / Atom

How to get the crash dump if system hangs?
 2019-10-20 19:31 UTC  - mbox.gz / Atom

[PATCH] slab: Redefine ZERO_SIZE_PTR to include ERR_PTR range
 2019-10-20 15:38 UTC  (5+ messages) - mbox.gz / Atom

[PATCH] kernel: dma: Make CMA boot parameters __ro_after_init
 2019-10-19  5:37 UTC  (3+ messages) - mbox.gz / Atom

page:   latest

Kernel-hardening archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/kernel-hardening/0 kernel-hardening/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 kernel-hardening kernel-hardening/ https://lore.kernel.org/kernel-hardening \
		kernel-hardening@lists.openwall.com
	public-inbox-index kernel-hardening

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/com.openwall.lists.kernel-hardening


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git