kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-29 16:43:50 to 2020-02-19 00:10:09 UTC [more...]

[PATCH 00/18] add support for Clang's Shadow Call Stack
 2020-02-19  0:08 UTC  (33+ messages)
` [PATCH v7 00/11] "
  ` [PATCH v7 07/11] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v7 09/11] arm64: disable SCS for hypervisor code
  ` [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
` [PATCH v8 00/12] add support for Clang's Shadow Call Stack
  ` [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v8 02/12] scs: add accounting
  ` [PATCH v8 03/12] scs: add support for stack usage debugging
  ` [PATCH v8 04/12] scs: disable when function graph tracing is enabled
  ` [PATCH v8 05/12] arm64: reserve x18 from general allocation with SCS
  ` [PATCH v8 06/12] arm64: preserve x18 when CPU is suspended
  ` [PATCH v8 07/12] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v8 08/12] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v8 09/12] arm64: disable SCS for hypervisor code
  ` [PATCH v8 10/12] arm64: implement Shadow Call Stack

Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
 2020-02-18 20:54 UTC  (5+ messages)

[PATCH v8 00/11] proc: modernize proc to support multiple private instances
 2020-02-14 14:15 UTC  (48+ messages)
` [PATCH v8 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v8 02/11] proc: add proc_fs_info struct to store proc information
` [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v8 04/11] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v8 06/11] proc: support mounting procfs instances inside same pid namespace
` [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
` [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v8 09/11] proc: add option to mount only a pids subset
` [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH v8 11/11] proc: Move hidepid values to uapi as they are user interface to mount

[PATCH] gcc-plugins: fix gcc-plugins directory path in documentation
 2020-02-13 12:24 UTC 

[PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
 2020-02-13  3:00 UTC  (8+ messages)
` [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
` [PATCH v3 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
` [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
` [PATCH v3 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
` [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
` [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part

[PATCH v3 0/7] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
 2020-02-12  9:28 UTC  (17+ messages)
` [PATCH v3 1/7] x86/elf: Add table to document READ_IMPLIES_EXEC
` [PATCH v3 2/7] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v3 3/7] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
` [PATCH v3 4/7] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
` [PATCH v3 5/7] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v3 6/7] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
` [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests

[RFC PATCH 00/11] Finer grained kernel address space randomization
 2020-02-11 12:39 UTC  (59+ messages)
` [RFC PATCH 01/11] modpost: Support >64K sections
` [RFC PATCH 02/11] x86: tools/relocs: Support >64K section headers
` [RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
` [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
` [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
` [RFC PATCH 06/11] x86: make sure _etext includes function sections
` [RFC PATCH 07/11] x86/tools: Adding relative relocs for randomized functions
` [RFC PATCH 08/11] x86: Add support for finer grained KASLR
` [RFC PATCH 09/11] kallsyms: hide layout and expose seed
` [RFC PATCH 10/11] module: Reorder functions
` [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss

[PATCH 0/5] Annotate allocation functions with alloc_size attribute
 2020-02-07 20:38 UTC  (3+ messages)
` [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes

[PATCH v2 0/6] implement KASLR for powerpc/fsl_booke/64
 2020-02-05  5:13 UTC  (8+ messages)
` [PATCH v2 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
` [PATCH v2 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
` [PATCH v2 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
` [PATCH v2 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
` [PATCH v2 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
` [PATCH v2 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part

[ANNOUNCE][CFP] Linux Security Summit North America 2020
 2020-02-03 23:59 UTC 

[PATCH v2] drm/radeon: have the callers of set_memory_*() check the return value
 2020-02-03 20:44 UTC  (3+ messages)

[kernel-hardening] [PATCH v5 00/38] Hardened usercopy whitelisting
 2020-02-03 17:41 UTC  (22+ messages)
` [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches

[PATCH v6 0/5] Implement STRICT_MODULE_RWX for powerpc
 2020-02-03  7:06 UTC  (5+ messages)
` [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines

[PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
 2020-02-01 16:40 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).