Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAGXu5jJPkq0OPPZD1xEN7JC5GOw=DqMygUEMmsiszni2HEtv0w@mail.gmail.com>
Date: Thu, 22 Jun 2017 21:31:44 -0700
From: Kees Cook <keescook@...omium.org>
To: Li Kun <hw.likun@...wei.com>
Cc: "Wangkai (Morgan, Euler)" <morgan.wang@...wei.com>, 
	"kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>
Subject: Re: [kernel hardening]Could we do something for KSPP?

On Thu, Jun 22, 2017 at 9:21 PM, Li Kun <hw.likun@...wei.com> wrote:
> I noticed that you have send a patch set of fast refcount overflow
> protection as below.
>
> http://kernel-hardening.openwall.narkive.com/qTKqEF4F/patch-v5-0-3-implement-fast-refcount-overflow-protection
>
> I think it is nearing accomplishment if i haven't get it wrong. Maybe i can
> do the job on arm64 based on your latest patch set?

It's certainly getting close. I'll post a v6 version for x86 soon
here, but if you want to start from v5, I think it should be
relatively easy to update it to match what gets accepted for x86.

Thanks!

-Kees

-- 
Kees Cook
Pixel Security

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.