kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-06 15:46:08 to 2020-02-25 17:41:24 UTC [more...]

[PATCH 00/18] add support for Clang's Shadow Call Stack
 2020-02-25 17:39 UTC  (57+ messages)
` [PATCH v7 00/11] "
  ` [PATCH v7 07/11] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v7 09/11] arm64: disable SCS for hypervisor code
  ` [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
` [PATCH v8 00/12] add support for Clang's Shadow Call Stack
  ` [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v8 02/12] scs: add accounting
  ` [PATCH v8 03/12] scs: add support for stack usage debugging
  ` [PATCH v8 04/12] scs: disable when function graph tracing is enabled
  ` [PATCH v8 05/12] arm64: reserve x18 from general allocation with SCS
  ` [PATCH v8 06/12] arm64: preserve x18 when CPU is suspended
  ` [PATCH v8 07/12] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v8 08/12] arm64: vdso: disable Shadow Call Stack
  ` [PATCH v8 09/12] arm64: disable SCS for hypervisor code
  ` [PATCH v8 10/12] arm64: implement Shadow Call Stack
  ` [PATCH v8 11/12] arm64: scs: add shadow stacks for SDEI
  ` [PATCH v8 12/12] efi/libstub: disable SCS
` [PATCH v9 00/12] add support for Clang's Shadow Call Stack
  ` [PATCH v9 01/12] add support for Clang's Shadow Call Stack (SCS)
  ` [PATCH v9 02/12] scs: add accounting
  ` [PATCH v9 03/12] scs: add support for stack usage debugging
  ` [PATCH v9 04/12] scs: disable when function graph tracing is enabled
  ` [PATCH v9 05/12] arm64: reserve x18 from general allocation with SCS
  ` [PATCH v9 06/12] arm64: preserve x18 when CPU is suspended
  ` [PATCH v9 07/12] arm64: efi: restore x18 if it was corrupted
  ` [PATCH v9 08/12] arm64: vdso: disable Shadow Call Stack

[PATCH v4 0/6] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
 2020-02-25  5:13 UTC  (7+ messages)
` [PATCH v4 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
` [PATCH v4 2/6] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v4 3/6] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
` [PATCH v4 4/6] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
` [PATCH v4 5/6] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v4 6/6] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces

[PATCH v8 00/11] proc: modernize proc to support multiple private instances
 2020-02-24 16:29 UTC  (74+ messages)
` [PATCH v8 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v8 02/11] proc: add proc_fs_info struct to store proc information
` [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v8 04/11] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v8 06/11] proc: support mounting procfs instances inside same pid namespace
` [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
                              ` [PATCH 0/7] proc: Dentry flushing without proc_mnt
                                ` [PATCH 1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                                ` [PATCH 2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                                ` [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
                                ` [PATCH 4/7] proc: Use d_invalidate "
                                ` [PATCH 5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                                ` [PATCH 6/7] proc: Use a list of inodes to flush from proc
                                ` [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
                                ` [PATCH v2 0/6] proc: Dentry flushing without proc_mnt
                                  ` [PATCH v2 1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                                  ` [PATCH v2 2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                                  ` [PATCH v2 3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
                                  ` [PATCH v2 4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
                                  ` [PATCH v2 5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                                  ` [PATCH v2 6/6] proc: Use a list of inodes to flush from proc
` [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v8 09/11] proc: add option to mount only a pids subset
` [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH v8 11/11] proc: Move hidepid values to uapi as they are user interface to mount

[RFC PATCH v14 00/10] Landlock LSM
 2020-02-24 16:02 UTC  (11+ messages)
` [RFC PATCH v14 01/10] landlock: Add object and rule management
` [RFC PATCH v14 02/10] landlock: Add ruleset and domain management
` [RFC PATCH v14 03/10] landlock: Set up the security framework and manage credentials
` [RFC PATCH v14 04/10] landlock: Add ptrace restrictions
` [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
` [RFC PATCH v14 06/10] landlock: Add syscall implementation
` [RFC PATCH v14 07/10] arch: Wire up landlock() syscall
` [RFC PATCH v14 08/10] selftests/landlock: Add initial tests
` [RFC PATCH v14 09/10] samples/landlock: Add a sandbox manager example
` [RFC PATCH v14 10/10] landlock: Add user and kernel documentation

[RFC PATCH 00/11] Finer grained kernel address space randomization
 2020-02-21 23:05 UTC  (43+ messages)
` [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
` [RFC PATCH 06/11] x86: make sure _etext includes function sections
` [RFC PATCH 08/11] x86: Add support for finer grained KASLR
` [RFC PATCH 09/11] kallsyms: hide layout and expose seed
` [RFC PATCH 10/11] module: Reorder functions
` [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss

[PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
 2020-02-20 13:50 UTC  (13+ messages)
` [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
` [PATCH v3 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
` [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
` [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
` [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part

Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
 2020-02-19 13:43 UTC  (6+ messages)

[PATCH] gcc-plugins: fix gcc-plugins directory path in documentation
 2020-02-13 12:24 UTC 

[PATCH v3 0/7] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
 2020-02-12  9:28 UTC  (17+ messages)
` [PATCH v3 1/7] x86/elf: Add table to document READ_IMPLIES_EXEC
` [PATCH v3 2/7] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v3 3/7] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
` [PATCH v3 4/7] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
` [PATCH v3 5/7] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
` [PATCH v3 6/7] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
` [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests

[PATCH 0/5] Annotate allocation functions with alloc_size attribute
 2020-02-07 20:38 UTC  (3+ messages)
` [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes

[RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
 2020-02-06 16:58 UTC  (3+ messages)

[RFC PATCH 06/11] x86: make sure _etext includes function sections
 2020-02-06 16:11 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).