kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
 messages from 2015-12-28 11:20:54 to 2016-01-20 07:12:08 UTC [more...]

[kernel-hardening] 2015 kernel CVEs
 2016-01-20  7:12 UTC  (16+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/8] introduce post-init read-only memory
 2016-01-20  2:56 UTC  (13+ messages)
` [kernel-hardening] [PATCH v4 1/8] asm-generic: consolidate mark_rodata_ro()
` [kernel-hardening] [PATCH v4 2/8] lib: add "on" and "off" to strtobool
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 3/8] param: convert some "on"/"off" users "
` [kernel-hardening] [PATCH v4 4/8] init: create cmdline param to disable readonly
` [kernel-hardening] [PATCH v4 5/8] x86: make CONFIG_DEBUG_RODATA non-optional
` [kernel-hardening] [PATCH v4 6/8] introduce post-init read-only memory
` [kernel-hardening] [PATCH v4 7/8] lkdtm: verify that __ro_after_init works correctly
` [kernel-hardening] [PATCH v4 8/8] x86, vdso: mark vDSO read-only after init
  ` [kernel-hardening] "

[kernel-hardening] Understanding the JIT Hardening feature
 2016-01-20  0:44 UTC  (4+ messages)

[kernel-hardening] status: GRKERNSEC_KSTACKOVERFLOW
 2016-01-20  0:03 UTC  (4+ messages)
` [kernel-hardening] "

[kernel-hardening] Still working on PAX_USERCOPY
 2016-01-19 23:59 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] Proposal for kernel self protection features
 2016-01-19 23:08 UTC  (4+ messages)
` [kernel-hardening] "

[kernel-hardening][RFC PATCH v2 00/12] Add PAX_REFCOUNT overflow protection
 2016-01-19 19:07 UTC  (3+ messages)

[kernel-hardening] For whoever's looking at memory santizing
 2016-01-19 17:23 UTC  (3+ messages)

[kernel-hardening] [RFC] kernel/panic: place an upper limit on number of oopses
 2016-01-17  3:58 UTC  (7+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v3 00/21] arm64: implement support for KASLR
 2016-01-15 11:23 UTC  (59+ messages)
` [kernel-hardening] [PATCH v3 01/21] of/fdt: make memblock minimum physical address arch configurable
` [kernel-hardening] [PATCH v3 02/21] arm64: introduce KIMAGE_VADDR as the virtual base of the kernel region
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 03/21] arm64: pgtable: add dummy pud_index() and pmd_index() definitions
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 04/21] arm64: decouple early fixmap init from linear mapping
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 05/21] arm64: kvm: deal with kernel symbols outside of "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 06/21] arm64: pgtable: implement static [pte|pmd|pud]_offset variants
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 07/21] arm64: move kernel image to base of vmalloc area
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 08/21] arm64: add support for module PLTs
` [kernel-hardening] [PATCH v3 09/21] extable: add support for relative extables to search and sort routines
` [kernel-hardening] [PATCH v3 10/21] arm64: switch to relative exception tables
` [kernel-hardening] [PATCH v3 11/21] arm64: avoid R_AARCH64_ABS64 relocations for Image header fields
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 12/21] arm64: avoid dynamic relocations in early boot code
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 13/21] arm64: allow kernel Image to be loaded anywhere in physical memory
` [kernel-hardening] [PATCH v3 14/21] arm64: redefine SWAPPER_TABLE_SHIFT for use in asm code
` [kernel-hardening] [PATCH v3 14/21] arm64: [re]define SWAPPER_TABLE_[SHIFT|SIZE] "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 15/21] arm64: split elf relocs into a separate header
` [kernel-hardening] [PATCH v3 16/21] scripts/sortextable: add support for ET_DYN binaries
` [kernel-hardening] [PATCH v3 17/21] arm64: add support for a relocatable kernel and KASLR
` [kernel-hardening] [PATCH v3 18/21] efi: stub: implement efi_get_random_bytes() based on EFI_RNG_PROTOCOL
` [kernel-hardening] [PATCH v3 19/21] efi: stub: add implementation of efi_random_alloc()
` [kernel-hardening] [PATCH v3 20/21] efi: stub: use high allocation for converted command line
` [kernel-hardening] [PATCH v3 21/21] arm64: efi: invoke EFI_RNG_PROTOCOL to supply KASLR randomness
` [kernel-hardening] Re: [PATCH v3 00/21] arm64: implement support for KASLR

[kernel-hardening] Self Introduction
 2016-01-14 11:11 UTC  (16+ messages)

[kernel-hardening] [RFC][PATCH 0/7] Sanitization of slabs based on grsecurity/PaX
 2016-01-14  3:49 UTC  (31+ messages)
` [kernel-hardening] [RFC][PATCH 1/7] mm/slab_common.c: Add common support for slab saniziation
  ` [kernel-hardening] "
` [kernel-hardening] [RFC][PATCH 5/7] mm: Mark several cases as SLAB_NO_SANITIZE
  ` [kernel-hardening] "
` [kernel-hardening] [RFC][PATCH 6/7] mm: Add Kconfig option for slab sanitization
` [kernel-hardening] [RFC][PATCH 7/7] lkdtm: Add READ_AFTER_FREE test
  ` [kernel-hardening] "
` [kernel-hardening] Re: [RFC][PATCH 0/7] Sanitization of slabs based on grsecurity/PaX

[kernel-hardening] Introduction and task request
 2016-01-12  3:15 UTC  (8+ messages)

[kernel-hardening] [PATCH 0/2] Document and extend kernel.perf_event_paranoid
 2016-01-11 15:23 UTC  (3+ messages)
` [kernel-hardening] [PATCH 1/2] Documentation,perf: Document the perf sysctls
` [kernel-hardening] [PATCH 2/2] security,perf: Allow further restriction of perf_event_open

[kernel-hardening] [PATCH v2 00/13] arm64: implement support for KASLR
 2016-01-08 16:14 UTC  (51+ messages)
` [kernel-hardening] [PATCH v2 01/13] of/fdt: make memblock minimum physical address arch configurable
` [kernel-hardening] [PATCH v2 02/13] arm64: introduce KIMAGE_VADDR as the virtual base of the kernel region
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 03/13] arm64: use more granular reservations for static page table allocations
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 04/13] arm64: decouple early fixmap init from linear mapping
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 05/13] arm64: kvm: deal with kernel symbols outside of "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 06/13] arm64: move kernel image to base of vmalloc area
` [kernel-hardening] [PATCH v2 07/13] arm64: add support for module PLTs
` [kernel-hardening] [PATCH v2 08/13] arm64: use relative references in exception tables
` [kernel-hardening] [PATCH v2 09/13] arm64: avoid R_AARCH64_ABS64 relocations for Image header fields
` [kernel-hardening] [PATCH v2 10/13] arm64: avoid dynamic relocations in early boot code
` [kernel-hardening] [PATCH v2 11/13] arm64: allow kernel Image to be loaded anywhere in physical memory
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 12/13] arm64: add support for relocatable kernel
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v2 13/13] arm64: efi: invoke EFI_RNG_PROTOCOL to supply KASLR randomness
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v2 00/13] arm64: implement support for KASLR

[kernel-hardening] [PATCH v2] ARM: mm: flip priority of CONFIG_DEBUG_RODATA
 2016-01-04 22:07 UTC  (9+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC PATCH 00/10] arm64: implement support for KASLR
 2016-01-04 12:31 UTC  (11+ messages)
` [kernel-hardening] [RFC PATCH 01/10] arm64: introduce KIMAGE_VADDR as the virtual base of the kernel region
  ` [kernel-hardening] "
` [kernel-hardening] [RFC PATCH 10/10] arm64: efi: invoke EFI_RNG_PROTOCOL to supply KASLR randomness
` [kernel-hardening] Re: [RFC PATCH 00/10] arm64: implement support for KASLR


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).