Kernel-hardening archive on lore.kernel.org
 help / color / Atom feed
[PATCH 00/18] add support for Clang's Shadow Call Stack
 2020-01-28 18:49 UTC  (34+ messages) - mbox.gz / Atom
` [PATCH v6 00/15] "
  ` [PATCH v6 01/15] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
  ` [PATCH v6 02/15] arm64/lib: copy_page: avoid x18 register in assembler code
  ` [PATCH v6 03/15] arm64: kvm: stop treating register x18 as caller save
  ` [PATCH v6 04/15] arm64: kernel: avoid x18 in __cpu_soft_restart
  ` [PATCH v6 05/15] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v6 06/15] scs: add accounting
  ` [PATCH v6 07/15] scs: add support for stack usage debugging
  ` [PATCH v6 08/15] arm64: disable function graph tracing with SCS
  ` [PATCH v6 09/15] arm64: reserve x18 from general allocation "
  ` [PATCH v6 10/15] arm64: preserve x18 when CPU is suspended
  ` [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v6 13/15] arm64: disable SCS for hypervisor code
  ` [PATCH v6 14/15] arm64: implement Shadow Call Stack
  ` [PATCH v6 15/15] arm64: scs: add shadow stacks for SDEI
` [PATCH v7 00/11] add support for Clang's Shadow Call Stack
  ` [PATCH v7 01/11] add support for Clang's Shadow Call Stack (SCS)

[PATCH v7 00/11] proc: modernize proc to support multiple private instances
 2020-01-28 14:58 UTC  (16+ messages) - mbox.gz / Atom
` [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
` [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace
` [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
` [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v7 09/11] proc: add option to mount only a pids subset
` [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount

[kernel-hardening] [PATCH v5 00/38] Hardened usercopy whitelisting
 2020-01-28  7:58 UTC  (8+ messages) - mbox.gz / Atom
` [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches

[PATCH 0/5] Annotate allocation functions with alloc_size attribute
 2020-01-20 22:51 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH 1/5] altera-stapl: altera_get_note: prevent write beyond end of 'key'
` [PATCH 2/5] [RFC] kasan: kasan_test: hide allocation sizes from the compiler
` [PATCH 3/5] [RFC] staging: rts5208: make len a u16 in rtsx_write_cfg_seq
` [PATCH 4/5] [VERY RFC] mm: kmalloc(_node): return NULL immediately for SIZE_MAX
` [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes

[PATCH v6 0/5] Implement STRICT_MODULE_RWX for powerpc
 2020-01-20  8:35 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
` [PATCH v6 2/5] powerpc/kprobes: Mark newly allocated probes as RO
` [PATCH v6 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
` [PATCH v6 4/5] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
` [PATCH v6 5/5] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig

[PATCH v2 0/2] FORTIFY_SOURCE: detect intra-object overflow in string functions
 2020-01-20  4:54 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH v2 1/2] string.h: detect intra-object overflow in fortified "
` [PATCH v2 2/2] lkdtm: tests for FORTIFY_SOURCE

[PATCH] string.h: detect intra-object overflow in fortified string functions
 2020-01-20  0:27 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v3 0/6] ubsan: Split out bounds checker
 2020-01-18  9:19 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v3 1/6] ubsan: Add trap instrumentation option
` [PATCH v3 2/6] ubsan: Split "bounds" checker from other options
` [PATCH v3 3/6] lkdtm/bugs: Add arithmetic overflow and array bounds checks
` [PATCH v3 4/6] ubsan: Check panic_on_warn
` [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
` [PATCH v3 6/6] ubsan: Include bug type in report header

[PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
 2020-01-09 20:16 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH 1/2] "
` [PATCH 2/2] drm/radeon: change call sites to handle return value properly

[RFC v5 43/57] gcc-plugins: objtool: Add plugin to detect switch table on arm64
 2020-01-09 16:02 UTC  - mbox.gz / Atom

[PATCH v6 00/10] proc: modernize proc to support multiple private instances
 2020-01-08 10:37 UTC  (17+ messages) - mbox.gz / Atom
` [PATCH v6 01/10] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v6 02/10] proc: add proc_fs_info struct to store proc information
` [PATCH v6 03/10] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v6 04/10] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v6 06/10] proc: support mounting procfs instances inside same pid namespace
` [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
` [PATCH v6 08/10] proc: instantiate only pids that we can ptrace on 'hidepid=3' mount option
` [PATCH v6 09/10] proc: add option to mount only a pids subset
` [PATCH v6 10/10] docs: proc: add documentation for "hidepid=3" and "pidonly" options and new mount behavior

[PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
 2019-12-30 19:41 UTC  (7+ messages) - mbox.gz / Atom

[PATCH v10 00/11] x86: PIE support to extend KASLR randomization
 2019-12-30 18:52 UTC  (26+ messages) - mbox.gz / Atom
` [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support
` [PATCH v10 02/11] x86: Add macro to get symbol address "
` [PATCH v10 03/11] x86: relocate_kernel - Adapt assembly "
` [PATCH v10 04/11] x86/entry/64: "
` [PATCH v10 05/11] x86: pm-trace - "
` [PATCH v10 06/11] x86/CPU: "
` [PATCH v10 07/11] x86/acpi: "
` [PATCH v10 08/11] x86/boot/64: "
` [PATCH v10 09/11] x86/power/64: "
` [PATCH v10 10/11] x86/paravirt: "
` [PATCH v10 11/11] x86/alternatives: "

[RESEND RFC 0/2] Paravirtualized Control Register pinning
 2019-12-24 22:56 UTC  - mbox.gz / Atom

[PATCH 1/2] powerpc/book3s64/hash: Disable 16M linear mapping size if not aligned
 2019-12-24  6:41 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH 2/2] powerpc: Remove STRICT_KERNEL_RWX incompatibility with RELOCATABLE

[PATCH v2 0/3] ubsan: Split out bounds checker
 2019-12-18  0:08 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v2 1/3] ubsan: Add trap instrumentation option

[PATCH] drivers/misc: have the callers of set_memory_*() check the return value
 2019-12-17 23:57 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v5 0/5] Implement STRICT_MODULE_RWX for powerpc
 2019-12-12  6:43 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO

[PATCH 07/11] io_uring: use atomic_t for refcounts
 2019-12-11 17:00 UTC  (7+ messages) - mbox.gz / Atom

[PATCH v7] crypto: x86: Regularize glue function prototypes
 2019-12-11  9:38 UTC  (3+ messages) - mbox.gz / Atom

Contributing to KSPP newbie
 2019-12-02 10:47 UTC  (7+ messages) - mbox.gz / Atom

Questions about "security functions" and "suppression of compilation alarms"
 2019-11-27 20:07 UTC  (2+ messages) - mbox.gz / Atom

contribute to KSPP
 2019-11-25 12:29 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v6 0/8] crypto: x86: Fix indirect function call casts
 2019-11-22  3:06 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v6 1/8] crypto: x86/glue_helper: Regularize function prototypes
` [PATCH v6 3/8] crypto: x86/camellia: Remove glue function macro usage
` [PATCH v6 5/8] crypto: x86/cast6: "
` [PATCH v6 6/8] crypto: x86/aesni: "
` [PATCH v6 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers
` [PATCH v6 8/8] crypto, x86/sha: Eliminate casts on asm implementations

page:   latest

Kernel-hardening archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/kernel-hardening/0 kernel-hardening/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 kernel-hardening kernel-hardening/ https://lore.kernel.org/kernel-hardening \
		kernel-hardening@lists.openwall.com
	public-inbox-index kernel-hardening

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/com.openwall.lists.kernel-hardening


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git