|
Message-ID: <CAGXu5jKf5iA63r0euOmgBBBoTBV-4LYTZPLQSY5oD4Uhzu=x8w@mail.gmail.com> Date: Mon, 9 Nov 2015 15:35:53 -0800 From: Kees Cook <keescook@...omium.org> To: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com> Subject: Re: Re: Kernel Self Protection Project On Mon, Nov 9, 2015 at 1:55 PM, David Windsor <dave@...141.net> wrote: > > On Mon, Nov 9, 2015 at 4:44 PM, <Valdis.Kletnieks@...edu> wrote: >> >> On Sat, 07 Nov 2015 22:50:04 -0800, Kees Cook said: >> >> > Yeah. Does anyone want to also extract PAX_USERCOPY or >> > GRKERNSEC_KSTACKOVERFLOW ? No one has mentioned an interest in those >> > yet. >> >> I'll commit to at least looking at PAX_USERCOPY. Looks reasonably >> stand-alone. > > The problem is cherrypicking these things from the original patchsets. I'm > doing that now for PAX_REFCOUNT, and it's proving more difficult than I > originally expected. Yes! Things are rather intertwined. :) -Kees -- Kees Cook Chrome OS Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.