|
Message-ID: <CAGXu5jJPkq0OPPZD1xEN7JC5GOw=DqMygUEMmsiszni2HEtv0w@mail.gmail.com> Date: Thu, 22 Jun 2017 21:31:44 -0700 From: Kees Cook <keescook@...omium.org> To: Li Kun <hw.likun@...wei.com> Cc: "Wangkai (Morgan, Euler)" <morgan.wang@...wei.com>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com> Subject: Re: [kernel hardening]Could we do something for KSPP? On Thu, Jun 22, 2017 at 9:21 PM, Li Kun <hw.likun@...wei.com> wrote: > I noticed that you have send a patch set of fast refcount overflow > protection as below. > > http://kernel-hardening.openwall.narkive.com/qTKqEF4F/patch-v5-0-3-implement-fast-refcount-overflow-protection > > I think it is nearing accomplishment if i haven't get it wrong. Maybe i can > do the job on arm64 based on your latest patch set? It's certainly getting close. I'll post a v6 version for x86 soon here, but if you want to start from v5, I think it should be relatively easy to update it to match what gets accepted for x86. Thanks! -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.