1. 01 7月, 2017 1 次提交
    • K
      randstruct: Mark various structs for randomization · 3859a271
      Kees Cook 提交于
      This marks many critical kernel structures for randomization. These are
      structures that have been targeted in the past in security exploits, or
      contain functions pointers, pointers to function pointer tables, lists,
      workqueues, ref-counters, credentials, permissions, or are otherwise
      sensitive. This initial list was extracted from Brad Spengler/PaX Team's
      code in the last public patch of grsecurity/PaX based on my understanding
      of the code. Changes or omissions from the original code are mine and
      don't reflect the original grsecurity/PaX code.
      
      Left out of this list is task_struct, which requires special handling
      and will be covered in a subsequent patch.
      Signed-off-by: NKees Cook <keescook@chromium.org>
      3859a271
  2. 19 4月, 2017 2 次提交
  3. 03 2月, 2017 1 次提交
  4. 20 1月, 2017 1 次提交
  5. 19 1月, 2017 1 次提交
  6. 02 5月, 2016 1 次提交
  7. 01 5月, 2016 8 次提交
  8. 28 4月, 2016 1 次提交
    • A
      tty: provide tty_name() even without CONFIG_TTY · 188e3c5c
      Arnd Bergmann 提交于
      The audit subsystem just started printing the name of the tty,
      but that causes a build failure when CONFIG_TTY is disabled:
      
      kernel/built-in.o: In function `audit_log_task_info':
      memremap.c:(.text+0x5e34c): undefined reference to `tty_name'
      kernel/built-in.o: In function `audit_set_loginuid':
      memremap.c:(.text+0x63b34): undefined reference to `tty_name'
      
      This adds tty_name() to the list of functions that are provided
      as trivial stubs in that configuration.
      Signed-off-by: NArnd Bergmann <arnd@arndb.de>
      Fixes: db0a6fb5 ("audit: add tty field to LOGIN event")
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      188e3c5c
  9. 29 1月, 2016 2 次提交
  10. 28 1月, 2016 14 次提交
  11. 27 1月, 2016 1 次提交
  12. 14 12月, 2015 6 次提交
  13. 21 11月, 2015 1 次提交