public inbox for kernel-hardening@lists.openwall.com
 help / color / mirror / Atom feed
 messages from 2016-02-26 00:36:41 to 2016-04-06 20:17:16 UTC [more...]

[kernel-hardening] [PATCH] Prefer kASLR over Hibernation
 2016-04-06 20:17 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC v1] mm: SLAB freelist randomization
 2016-04-06 19:35 UTC 

[kernel-hardening] [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
 2016-04-06 19:23 UTC  (16+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v2 00/11] MIPS relocatable kernel & KASLR
 2016-04-05 21:00 UTC  (22+ messages)
` [kernel-hardening] [PATCH v2 01/11] MIPS: tools: Add relocs tool
` [kernel-hardening] [PATCH v2 02/11] MIPS: tools: Build "
` [kernel-hardening] [PATCH v2 03/11] MIPS: Reserve space for relocation table
` [kernel-hardening] [PATCH v2 04/11] MIPS: Generate relocation table when CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 05/11] MIPS: Kernel: Add relocate.c
` [kernel-hardening] [PATCH v2 06/11] MIPS: Call relocate_kernel if CONFIG_RELOCATABLE=y
` [kernel-hardening] [PATCH v2 07/11] MIPS: bootmem: When relocatable, free memory below kernel
` [kernel-hardening] [PATCH v2 08/11] MIPS: Add CONFIG_RELOCATABLE Kconfig option
` [kernel-hardening] [PATCH v2 09/11] MIPS: Introduce plat_get_fdt a platform API to retrieve the FDT
` [kernel-hardening] [PATCH v2 10/11] MIPS: Kernel: Implement KASLR using CONFIG_RELOCATABLE
` [kernel-hardening] [PATCH v2 11/11] MIPS: KASLR: Print relocation Information on boot
  ` [kernel-hardening] "

[kernel-hardening] Re: [PATCH v4 00/20] x86, boot: kaslr cleanup and 64bit kaslr support
 2016-04-05 20:00 UTC 

[kernel-hardening] [PATCH v5 0/5] Introduce GCC plugin infrastructure
 2016-04-02  4:32 UTC  (32+ messages)
` [kernel-hardening] [PATCH v5 1/5] Shared library support
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 2/5] GCC plugin infrastructure
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 3/5] Add Cyclomatic complexity GCC plugin
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v5 4/5] Documentation for the GCC plugin infrastructure
` [kernel-hardening] [PATCH v5 5/5] Add sancov plugin
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies
 2016-04-01 12:57 UTC  (27+ messages)
` [kernel-hardening] [PATCH v4 1/4] SROP Mitigation: Architecture independent code for signal cookies
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/4] x86: SROP Mitigation: Implement Signal Cookies
` [kernel-hardening] [PATCH v4 3/4] Sysctl: SROP Mitigation: Add Sysctl argument to disable SROP
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 4/4] Documentation: SROP Mitigation: Add documentation for SROP cookies
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies

[kernel-hardening] [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing
 2016-03-29 19:07 UTC  (31+ messages)
` [kernel-hardening] [RFC v1 01/17] um: Export the sys_call_table
` [kernel-hardening] [RFC v1 02/17] seccomp: Fix typo
` [kernel-hardening] [RFC v1 03/17] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
  ` [kernel-hardening] "
      ` [kernel-hardening] [PATCH 1/2] "
        ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 04/17] selftest/seccomp: Fix the seccomp(2) signature
  ` [kernel-hardening] "
      ` [kernel-hardening] [PATCH 2/2] "
        ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 05/17] security/seccomp: Add LSM and create arrays of syscall metadata
  ` [kernel-hardening] "
` [kernel-hardening] [RFC v1 06/17] seccomp: Add the SECCOMP_ADD_CHECKER_GROUP command
` [kernel-hardening] [RFC v1 07/17] seccomp: Add seccomp object checker evaluation
` [kernel-hardening] [RFC v1 08/17] selftest/seccomp: Remove unknown_ret_is_kill_above_allow test
` [kernel-hardening] [RFC v1 09/17] selftest/seccomp: Extend seccomp_data until matches[6]
  ` [kernel-hardening] [RFC v1 10/17] selftest/seccomp: Add field_is_valid_syscall test
  ` [kernel-hardening] [RFC v1 11/17] selftest/seccomp: Add argeval_open_whitelist test
  ` [kernel-hardening] [RFC v1 12/17] audit,seccomp: Extend audit with seccomp state
  ` [kernel-hardening] [RFC v1 13/17] selftest/seccomp: Rename TRACE_poke to TRACE_poke_sys_read
  ` [kernel-hardening] [RFC v1 14/17] selftest/seccomp: Make tracer_poke() more generic
  ` [kernel-hardening] [RFC v1 15/17] selftest/seccomp: Add argeval_toctou_argument test
  ` [kernel-hardening] [RFC v1 16/17] security/seccomp: Protect against filesystem TOCTOU
  ` [kernel-hardening] [RFC v1 17/17] selftest/seccomp: Add argeval_toctou_filesystem test
` [kernel-hardening] Re: [RFC v1 00/17] seccomp-object: From attack surface reduction to sandboxing

[kernel-hardening] [ANNOUNCE] Linux Security Summit 2016 - CFP
 2016-03-24 22:55 UTC 

[kernel-hardening] [CSW16] Getting Physical: Extreme Abuse of Intel Based Paging Systems
 2016-03-23 12:32 UTC 

[kernel-hardening] [PATCH] s390: disable postinit-readonly for now
 2016-03-21 19:33 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies
 2016-03-10  9:43 UTC  (18+ messages)
` [kernel-hardening] [PATCH v3 2/3] x86: SROP mitigation: implement "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v3 3/3] SROP mitigation: Add sysctl to disable SROP protection
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies

[kernel-hardening] [PATCHv4 0/2] Sanitization of buddy pages
 2016-03-09 21:00 UTC  (7+ messages)
` [kernel-hardening] [PATCHv4 1/2] mm/page_poison.c: Enable PAGE_POISONING as a separate option
  ` [kernel-hardening] "
` [kernel-hardening] [PATCHv4 2/2] mm/page_poisoning.c: Allow for zero poisoning
  ` [kernel-hardening] "
` [kernel-hardening] Re: [PATCHv4 0/2] Sanitization of buddy pages

[kernel-hardening] [RFC][PATCH] s390, postinit-readonly: implement post-init RO
 2016-03-08 12:56 UTC  (5+ messages)
` [kernel-hardening] "

[kernel-hardening] [PATCH v5 0/7] introduce post-init read-only memory
 2016-03-08  0:23 UTC  (5+ messages)
` [kernel-hardening] [PATCH v5 4/7] "
  ` [kernel-hardening] "

[kernel-hardening] [PATCH v4 0/3] Introduce GCC plugin infrastructure
 2016-03-02 21:33 UTC  (13+ messages)
` [kernel-hardening] [PATCH v4 1/3] "
  ` [kernel-hardening] "
` [kernel-hardening] [PATCH v4 2/3] Add Cyclomatic complexity GCC plugin
` [kernel-hardening] [PATCH v4 3/3] Documentation for the GCC plugin infrastructure
` [kernel-hardening] Re: [PATCH v4 0/3] Introduce "

[kernel-hardening] [PULL] lkdtm update (next)
 2016-03-02  0:53 UTC  (2+ messages)
` [kernel-hardening] "

[kernel-hardening] [RFC 0/2] format_template attribute
 2016-03-01 21:54 UTC  (3+ messages)

[kernel-hardening] [PATCHv2] lkdtm: Add READ_AFTER_FREE test
 2016-03-01  1:37 UTC  (19+ messages)
` [kernel-hardening] "

[kernel-hardening] XPFO RFC
 2016-02-26 23:19 UTC 

[kernel-hardening] [PATCHv2 0/3] LKDTM use after free test updates
 2016-02-26 22:57 UTC  (7+ messages)
` [kernel-hardening] [PATCHv4 1/3] lkdtm: Add READ_AFTER_FREE test
` [kernel-hardening] [PATCH 2/3] lkdtm: Update WRITE_AFTER_FREE test
` [kernel-hardening] [PATCHv2 3/3] lkdtm: Add read/write after free tests for buddy memory
` [kernel-hardening] Re: [PATCHv2 0/3] LKDTM use after free test updates


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox