kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
[kernel-hardening] [PATCH v5 00/38] Hardened usercopy whitelisting
 2019-11-12  7:17 UTC  (3+ messages)
` [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches

[PATCH v4 0/8] crypto: x86: Fix indirect function call casts
 2019-11-12  3:16 UTC  (12+ messages)
` [PATCH v4 1/8] crypto: x86/glue_helper: Add function glue macros
` [PATCH v4 2/8] crypto: x86/serpent: Use new glue function macros
` [PATCH v4 3/8] crypto: x86/camellia: "
` [PATCH v4 4/8] crypto: x86/twofish: "
` [PATCH v4 5/8] crypto: x86/cast6: "
` [PATCH v4 6/8] crypto: x86/aesni: "
` [PATCH v4 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers
` [PATCH v4 8/8] crypto, x86/sha: Eliminate casts on asm implementations

[PATCH bpf-next v13 0/7] Landlock LSM
 2019-11-08 15:39 UTC  (26+ messages)
` [PATCH bpf-next v13 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v13 2/7] landlock: Add the management of domains
` [PATCH bpf-next v13 3/7] landlock,seccomp: Apply Landlock programs to process hierarchy
` [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v13 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v13 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation for Landlock

[PRE-REVIEW PATCH 00/16] Modernize the tasklet API
 2019-11-07 21:22 UTC  (7+ messages)

[PATCH 00/18] add support for Clang's Shadow Call Stack
 2019-11-07 16:26 UTC  (123+ messages)
` [PATCH v2 00/17] "
  ` [PATCH v2 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v2 09/17] arm64: disable function graph tracing with SCS
` [PATCH v3 00/17] add support for Clang's Shadow Call Stack
  ` [PATCH v3 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v3 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v3 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v3 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
  ` [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v3 06/17] scs: add accounting
  ` [PATCH v3 07/17] scs: add support for stack usage debugging
  ` [PATCH v3 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v3 09/17] arm64: kprobes: fix kprobes "
  ` [PATCH v3 10/17] arm64: disable kretprobes with SCS
  ` [PATCH v3 11/17] arm64: disable function graph tracing "
  ` [PATCH v3 12/17] arm64: reserve x18 from general allocation "
  ` [PATCH v3 13/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v3 14/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v3 15/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v3 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v3 17/17] arm64: implement Shadow Call Stack
` [PATCH v4 00/17] add support for Clang's "
  ` [PATCH v4 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v4 02/17] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
  ` [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v4 06/17] scs: add accounting
  ` [PATCH v4 07/17] scs: add support for stack usage debugging
  ` [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
  ` [PATCH v4 09/17] arm64: kprobes: fix kprobes "
  ` [PATCH v4 10/17] arm64: disable kretprobes with SCS
  ` [PATCH v4 11/17] arm64: disable function graph tracing "
  ` [PATCH v4 12/17] arm64: reserve x18 from general allocation "
  ` [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
  ` [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v4 15/17] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v4 16/17] arm64: disable SCS for hypervisor code
  ` [PATCH v4 17/17] arm64: implement Shadow Call Stack
` [PATCH v5 00/14] add support for Clang's "
  ` [PATCH v5 01/14] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v5 02/14] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v5 03/14] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v5 04/14] arm64: kernel: avoid x18 in __cpu_soft_restart
  ` [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v5 06/14] scs: add accounting
  ` [PATCH v5 07/14] scs: add support for stack usage debugging
  ` [PATCH v5 08/14] arm64: disable function graph tracing with SCS
  ` [PATCH v5 09/14] arm64: reserve x18 from general allocation "
  ` [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended
  ` [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v5 12/14] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v5 13/14] arm64: disable SCS for hypervisor code
  ` [PATCH v5 14/14] arm64: implement Shadow Call Stack

[PATCH v5 0/5] Implement STRICT_MODULE_RWX for powerpc
 2019-11-02 10:45 UTC  (14+ messages)
` [PATCH v5 1/5] powerpc/mm: Implement set_memory() routines
` [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
` [PATCH v5 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
` [PATCH v5 4/5] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
` [PATCH v5 5/5] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig

How to get the crash dump if system hangs?
 2019-11-02  5:42 UTC  (4+ messages)

[PATCH bpf-next v12 0/7] Landlock LSM
 2019-10-31 16:44 UTC  (8+ messages)
` [PATCH bpf-next v12 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v12 2/7] landlock: Add the management of domains
` [PATCH bpf-next v12 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v12 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v12 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v4 0/6] lib/string: Add strscpy_pad() function
 2019-10-30 19:16 UTC  (4+ messages)
` [PATCH v4 2/6] kselftest: Add test runner creation script

[PATCH v4 0/4] Implement STRICT_MODULE_RWX for powerpc
 2019-10-30 18:43 UTC  (4+ messages)

[PATCH V2] kernel: dma: contigous: Make CMA parameters __initdata/__initconst
 2019-10-30 18:12 UTC  (2+ messages)

[PATCH bpf-next v11 0/7] Landlock LSM
 2019-10-30 14:03 UTC  (10+ messages)
` [PATCH bpf-next v11 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v11 2/7] landlock: Add the management of domains
` [PATCH bpf-next v11 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v11 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v11 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v11 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v11 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v7 1/2] powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
 2019-10-30 12:14 UTC  (2+ messages)

[PATCH v9 00/11] x86: PIE support to extend KASLR randomization
 2019-10-29 21:31 UTC  (11+ messages)
` [PATCH v9 08/11] x86/boot/64: Adapt assembly for PIE support
` [PATCH v9 10/11] x86/paravirt: "
` [PATCH v9 11/11] x86/alternatives: "

page:  |  | latest

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).