Kernel Hardening
[Prev Page][Next Page]
[PATCH v2] drm/radeon: have the callers of set_memory_*() check the return value,
Tianlin Li
[PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc,
Russell Currey
[PATCH v7 00/11] proc: modernize proc to support multiple private instances,
Alexey Gladkov
- [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts, Alexey Gladkov
- [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info, Alexey Gladkov
- [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information, Alexey Gladkov
- [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info, Alexey Gladkov
- [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options, Alexey Gladkov
- [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace, Alexey Gladkov
- [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option, Alexey Gladkov
- [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances, Alexey Gladkov
- [PATCH v7 09/11] proc: add option to mount only a pids subset, Alexey Gladkov
- [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior, Alexey Gladkov
- [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount, Alexey Gladkov
[PATCH 0/5] Annotate allocation functions with alloc_size attribute,
Daniel Axtens
[PATCH v2 0/2] FORTIFY_SOURCE: detect intra-object overflow in string functions,
Daniel Axtens
[PATCH] string.h: detect intra-object overflow in fortified string functions,
Daniel Axtens
[PATCH v3 0/6] ubsan: Split out bounds checker,
Kees Cook
[RFC v5 43/57] gcc-plugins: objtool: Add plugin to detect switch table on arm64, Julien Thierry
[PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value,
Tianlin Li
[PATCH v6 00/10] proc: modernize proc to support multiple private instances,
Alexey Gladkov
- [PATCH v6 01/10] proc: Rename struct proc_fs_info to proc_fs_opts, Alexey Gladkov
- [PATCH v6 02/10] proc: add proc_fs_info struct to store proc information, Alexey Gladkov
- [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances, Alexey Gladkov
- [PATCH v6 03/10] proc: move /proc/{self|thread-self} dentries to proc_fs_info, Alexey Gladkov
- [PATCH v6 04/10] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info, Alexey Gladkov
- [PATCH v6 08/10] proc: instantiate only pids that we can ptrace on 'hidepid=3' mount option, Alexey Gladkov
- [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options, Alexey Gladkov
- [PATCH v6 06/10] proc: support mounting procfs instances inside same pid namespace, Alexey Gladkov
- [PATCH v6 09/10] proc: add option to mount only a pids subset, Alexey Gladkov
- [PATCH v6 10/10] docs: proc: add documentation for "hidepid=3" and "pidonly" options and new mount behavior, Alexey Gladkov
- Re: [PATCH v6 00/10] proc: modernize proc to support multiple private instances, Alexey Dobriyan
Re: [RESEND RFC 0/2] Paravirtualized Control Register pinning, Liran Alon
[PATCH 1/2] powerpc/book3s64/hash: Disable 16M linear mapping size if not aligned,
Russell Currey
[PATCH v6 0/5] Implement STRICT_MODULE_RWX for powerpc,
Russell Currey
[PATCH] drivers/misc: have the callers of set_memory_*() check the return value,
Tianlin Li
[PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again,
Arnd Bergmann
Re: [PATCH 07/11] io_uring: use atomic_t for refcounts,
Jann Horn
[PATCH v10 00/11] x86: PIE support to extend KASLR randomization,
Thomas Garnier
- [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 02/11] x86: Add macro to get symbol address for PIE support, Thomas Garnier
- [PATCH v10 03/11] x86: relocate_kernel - Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 05/11] x86: pm-trace - Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 06/11] x86/CPU: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 07/11] x86/acpi: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 08/11] x86/boot/64: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 09/11] x86/power/64: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 10/11] x86/paravirt: Adapt assembly for PIE support, Thomas Garnier
- [PATCH v10 11/11] x86/alternatives: Adapt assembly for PIE support, Thomas Garnier
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization, Peter Zijlstra
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization, Borislav Petkov
Contributing to KSPP newbie,
Kassad
Re: Questions about "security functions" and "suppression of compilation alarms".,
Kees Cook
[PATCH v7] crypto: x86: Regularize glue function prototypes,
Kees Cook
[PATCH v6 0/8] crypto: x86: Fix indirect function call casts,
Kees Cook
- [PATCH v6 4/8] crypto: x86/twofish: Remove glue function macro usage, Kees Cook
- [PATCH v6 2/8] crypto: x86/serpent: Remove glue function macros usage, Kees Cook
- [PATCH v6 1/8] crypto: x86/glue_helper: Regularize function prototypes, Kees Cook
- [PATCH v6 3/8] crypto: x86/camellia: Remove glue function macro usage, Kees Cook
- [PATCH v6 6/8] crypto: x86/aesni: Remove glue function macro usage, Kees Cook
- [PATCH v6 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers, Kees Cook
- [PATCH v6 8/8] crypto, x86/sha: Eliminate casts on asm implementations, Kees Cook
- [PATCH v6 5/8] crypto: x86/cast6: Remove glue function macro usage, Kees Cook
- Re: [PATCH v6 0/8] crypto: x86: Fix indirect function call casts, Eric Biggers
[PATCH v2 0/3] ubsan: Split out bounds checker,
Kees Cook
[PATCH 0/3] ubsan: Split out bounds checker,
Kees Cook
[RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value,
Tianlin Li
[PATCH v2] staging: rtl*: Remove tasklet callback casts, Kees Cook
[PATCH 0/6] implement KASLR for powerpc/fsl_booke/64,
Jason Yan
[PATCH] staging: rtl*: Remove tasklet callback casts,
Kees Cook
[PATCH 0/5] bnx2x: Remove function casts,
Kees Cook
contribute to KSPP,
Peng Fan
[PATCH v5 0/8] crypto: x86: Fix indirect function call casts,
Kees Cook
Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches,
Jiri Slaby
[PATCH v4 0/8] crypto: x86: Fix indirect function call casts,
Kees Cook
[PATCH bpf-next v13 0/7] Landlock LSM,
Mickaël Salaün
- [PATCH bpf-next v13 3/7] landlock,seccomp: Apply Landlock programs to process hierarchy, Mickaël Salaün
- [PATCH bpf-next v13 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks, Mickaël Salaün
- [PATCH bpf-next v13 6/7] bpf,landlock: Add tests for the Landlock ptrace program type, Mickaël Salaün
- [PATCH bpf-next v13 2/7] landlock: Add the management of domains, Mickaël Salaün
- [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks, Mickaël Salaün
- [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation for Landlock, Mickaël Salaün
- [PATCH bpf-next v13 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper, Mickaël Salaün
[PATCH bpf-next v12 0/7] Landlock LSM,
Mickaël Salaün
- [PATCH bpf-next v12 3/7] landlock,seccomp: Load Landlock programs per process hierarchy, Mickaël Salaün
- [PATCH bpf-next v12 2/7] landlock: Add the management of domains, Mickaël Salaün
- [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks, Mickaël Salaün
- [PATCH bpf-next v12 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks, Mickaël Salaün
- [PATCH bpf-next v12 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper, Mickaël Salaün
- [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock, Mickaël Salaün
- [PATCH bpf-next v12 6/7] bpf,landlock: Add tests for the Landlock ptrace program type, Mickaël Salaün
[PATCH v5 0/5] Implement STRICT_MODULE_RWX for powerpc,
Russell Currey
[PATCH bpf-next v11 0/7] Landlock LSM,
Mickaël Salaün
- [PATCH bpf-next v11 2/7] landlock: Add the management of domains, Mickaël Salaün
- [PATCH bpf-next v11 3/7] landlock,seccomp: Load Landlock programs per process hierarchy, Mickaël Salaün
- [PATCH bpf-next v11 7/7] landlock: Add user and kernel documentation for Landlock, Mickaël Salaün
- [PATCH bpf-next v11 4/7] landlock: Add ptrace LSM hooks, Mickaël Salaün
- [PATCH bpf-next v11 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper, Mickaël Salaün
- [PATCH bpf-next v11 6/7] bpf,landlock: Add tests for the Landlock ptrace program type, Mickaël Salaün
- [PATCH bpf-next v11 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks, Mickaël Salaün
[PATCH V2] kernel: dma: contigous: Make CMA parameters __initdata/__initconst,
Shyam Saini
[PATCH 00/18] add support for Clang's Shadow Call Stack,
Sami Tolvanen
- [PATCH 01/18] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings, Sami Tolvanen
- [PATCH 02/18] arm64/lib: copy_page: avoid x18 register in assembler code, Sami Tolvanen
- [PATCH 03/18] arm64: kvm: stop treating register x18 as caller save, Sami Tolvanen
- [PATCH 04/18] arm64: kernel: avoid x18 as an arbitrary temp register, Sami Tolvanen
- [PATCH 05/18] arm64: kbuild: reserve reg x18 from general allocation by the compiler, Sami Tolvanen
- [PATCH 06/18] add support for Clang's Shadow Call Stack (SCS), Sami Tolvanen
- [PATCH 07/18] scs: add accounting, Sami Tolvanen
- [PATCH 08/18] scs: add support for stack usage debugging, Sami Tolvanen
- [PATCH 09/18] trace: disable function graph tracing with SCS, Sami Tolvanen
- [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES, Sami Tolvanen
- [PATCH 11/18] kprobes: disable kretprobes with SCS, Sami Tolvanen
- [PATCH 12/18] arm64: reserve x18 only with Shadow Call Stack, Sami Tolvanen
- [PATCH 13/18] arm64: preserve x18 when CPU is suspended, Sami Tolvanen
- [PATCH 14/18] arm64: efi: restore x18 if it was corrupted, Sami Tolvanen
- [PATCH 15/18] arm64: vdso: disable Shadow Call Stack, Sami Tolvanen
- [PATCH 16/18] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES, Sami Tolvanen
- [PATCH 17/18] arm64: disable SCS for hypervisor code, Sami Tolvanen
- [PATCH 18/18] arm64: implement Shadow Call Stack, Sami Tolvanen
- Re: [PATCH 00/18] add support for Clang's Shadow Call Stack, Masami Hiramatsu
- [PATCH v2 00/17] add support for Clang's Shadow Call Stack, samitolvanen
- [PATCH v2 01/17] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings, samitolvanen
- [PATCH v2 02/17] arm64/lib: copy_page: avoid x18 register in assembler code, samitolvanen
- [PATCH v2 03/17] arm64: kvm: stop treating register x18 as caller save, samitolvanen
- [PATCH v2 04/17] arm64: kernel: avoid x18 as an arbitrary temp register, samitolvanen
- [PATCH v2 05/17] add support for Clang's Shadow Call Stack (SCS), samitolvanen
- [PATCH v2 06/17] scs: add accounting, samitolvanen
- [PATCH v2 07/17] scs: add support for stack usage debugging, samitolvanen
- [PATCH v2 08/17] kprobes: fix compilation without CONFIG_KRETPROBES, samitolvanen
- [PATCH v2 09/17] arm64: disable function graph tracing with SCS, samitolvanen
- [PATCH v2 10/17] arm64: disable kretprobes with SCS, samitolvanen
- [PATCH v2 11/17] arm64: reserve x18 from general allocation with SCS, samitolvanen
- [PATCH v2 12/17] arm64: preserve x18 when CPU is suspended, samitolvanen
- [PATCH v2 13/17] arm64: efi: restore x18 if it was corrupted, samitolvanen
- [PATCH v2 14/17] arm64: vdso: disable Shadow Call Stack, samitolvanen
- [PATCH v2 15/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES, samitolvanen
- [PATCH v2 16/17] arm64: disable SCS for hypervisor code, samitolvanen
- [PATCH v2 17/17] arm64: implement Shadow Call Stack, samitolvanen
- [PATCH v3 00/17] add support for Clang's Shadow Call Stack, samitolvanen
- [PATCH v3 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings, samitolvanen
- [PATCH v3 02/17] arm64/lib: copy_page: avoid x18 register in assembler code, samitolvanen
- [PATCH v3 03/17] arm64: kvm: stop treating register x18 as caller save, samitolvanen
- [PATCH v3 04/17] arm64: kernel: avoid x18 __cpu_soft_restart, samitolvanen
- [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS), samitolvanen
- [PATCH v3 06/17] scs: add accounting, samitolvanen
- [PATCH v3 07/17] scs: add support for stack usage debugging, samitolvanen
- [PATCH v3 08/17] kprobes: fix compilation without CONFIG_KRETPROBES, samitolvanen
- [PATCH v3 09/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES, samitolvanen
- [PATCH v3 10/17] arm64: disable kretprobes with SCS, samitolvanen
- [PATCH v3 11/17] arm64: disable function graph tracing with SCS, samitolvanen
- [PATCH v3 12/17] arm64: reserve x18 from general allocation with SCS, samitolvanen
- [PATCH v3 13/17] arm64: preserve x18 when CPU is suspended, samitolvanen
- [PATCH v3 14/17] arm64: efi: restore x18 if it was corrupted, samitolvanen
- [PATCH v3 15/17] arm64: vdso: disable Shadow Call Stack, samitolvanen
- [PATCH v3 16/17] arm64: disable SCS for hypervisor code, samitolvanen
- [PATCH v3 17/17] arm64: implement Shadow Call Stack, samitolvanen
- [PATCH v4 00/17] add support for Clang's Shadow Call Stack, Sami Tolvanen
- [PATCH v4 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings, Sami Tolvanen
- [PATCH v4 02/17] arm64/lib: copy_page: avoid x18 register in assembler code, Sami Tolvanen
- [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save, Sami Tolvanen
- [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart, Sami Tolvanen
- [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS), Sami Tolvanen
- [PATCH v4 06/17] scs: add accounting, Sami Tolvanen
- [PATCH v4 07/17] scs: add support for stack usage debugging, Sami Tolvanen
- [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES, Sami Tolvanen
- [PATCH v4 09/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES, Sami Tolvanen
- [PATCH v4 10/17] arm64: disable kretprobes with SCS, Sami Tolvanen
- [PATCH v4 11/17] arm64: disable function graph tracing with SCS, Sami Tolvanen
- [PATCH v4 12/17] arm64: reserve x18 from general allocation with SCS, Sami Tolvanen
- [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended, Sami Tolvanen
- [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted, Sami Tolvanen
- [PATCH v4 15/17] arm64: vdso: disable Shadow Call Stack, Sami Tolvanen
- [PATCH v4 16/17] arm64: disable SCS for hypervisor code, Sami Tolvanen
- [PATCH v4 17/17] arm64: implement Shadow Call Stack, Sami Tolvanen
- [PATCH v5 00/14] add support for Clang's Shadow Call Stack, Sami Tolvanen
- [PATCH v5 01/14] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings, Sami Tolvanen
- [PATCH v5 02/14] arm64/lib: copy_page: avoid x18 register in assembler code, Sami Tolvanen
- [PATCH v5 03/14] arm64: kvm: stop treating register x18 as caller save, Sami Tolvanen
- [PATCH v5 04/14] arm64: kernel: avoid x18 in __cpu_soft_restart, Sami Tolvanen
- [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS), Sami Tolvanen
- [PATCH v5 06/14] scs: add accounting, Sami Tolvanen
- [PATCH v5 07/14] scs: add support for stack usage debugging, Sami Tolvanen
- [PATCH v5 08/14] arm64: disable function graph tracing with SCS, Sami Tolvanen
- [PATCH v5 09/14] arm64: reserve x18 from general allocation with SCS, Sami Tolvanen
- [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended, Sami Tolvanen
- [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted, Sami Tolvanen
- [PATCH v5 12/14] arm64: vdso: disable Shadow Call Stack, Sami Tolvanen
- [PATCH v5 13/14] arm64: disable SCS for hypervisor code, Sami Tolvanen
- [PATCH v5 14/14] arm64: implement Shadow Call Stack, Sami Tolvanen
- Re: [PATCH v5 00/14] add support for Clang's Shadow Call Stack, Kees Cook
- [PATCH v6 00/15] add support for Clang's Shadow Call Stack, Sami Tolvanen
- [PATCH v6 01/15] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings, Sami Tolvanen
- [PATCH v6 02/15] arm64/lib: copy_page: avoid x18 register in assembler code, Sami Tolvanen
- [PATCH v6 03/15] arm64: kvm: stop treating register x18 as caller save, Sami Tolvanen
- [PATCH v6 04/15] arm64: kernel: avoid x18 in __cpu_soft_restart, Sami Tolvanen
- [PATCH v6 05/15] add support for Clang's Shadow Call Stack (SCS), Sami Tolvanen
- [PATCH v6 06/15] scs: add accounting, Sami Tolvanen
- [PATCH v6 07/15] scs: add support for stack usage debugging, Sami Tolvanen
- [PATCH v6 08/15] arm64: disable function graph tracing with SCS, Sami Tolvanen
- [PATCH v6 09/15] arm64: reserve x18 from general allocation with SCS, Sami Tolvanen
- [PATCH v6 10/15] arm64: preserve x18 when CPU is suspended, Sami Tolvanen
- [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted, Sami Tolvanen
- [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack, Sami Tolvanen
- [PATCH v6 13/15] arm64: disable SCS for hypervisor code, Sami Tolvanen
- [PATCH v6 14/15] arm64: implement Shadow Call Stack, Sami Tolvanen
- [PATCH v6 15/15] arm64: scs: add shadow stacks for SDEI, Sami Tolvanen
[Index of Archives]
[Linux Samsung SoC]
[Linux Actions SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]