Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEXv5_gaBRfNkxUAqRRT8q6F_zPEp5W1TXV=APvZ8tExN=mVtw@mail.gmail.com>
Date: Sat, 29 Oct 2016 14:05:38 -0400
From: David Windsor <dwindsor@...il.com>
To: "Reshetova, Elena" <elena.reshetova@...el.com>
Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Kees Cook <keescook@...omium.org>, 
	Hans Liljestrand <ishkamiel@...il.com>
Subject: Re: [RFC v2 PATCH 00/13] HARDENED_ATOMIC

I see the documentation change.  It's just one sentence in the "x86
Race Condition" section: "Note that only SMP systems are vulnerable to
this race condition."

On Sat, Oct 29, 2016 at 1:56 PM, Reshetova, Elena
<elena.reshetova@...el.com> wrote:
>>Ah yes, I forgot about this, sorry!  I just updated the language in Documentation/security/hardened-atomic.txt to include a line indicating that the x86 race is only reachable in SMP conditions.
>
>> I push --force'd the change to hardened_atomic_next.
>
> Hm.. I cannot see any documentation change there. Hans, you were not force pushing today, right? Only adding that commits on top?
> Wonder what went wrong....
>
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.