|
Message-ID: <CALCETrWhzZF0St_=xVQvntcDt4Hc9qYkXZ6dyhK+NTAy7-dVEA@mail.gmail.com> Date: Wed, 4 Oct 2017 21:40:48 -0700 From: Andy Lutomirski <luto@...capital.net> To: Alexander Popov <alex.popov@...ux.com> Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Kees Cook <keescook@...omium.org>, PaX Team <pageexec@...email.hu>, Brad Spengler <spender@...ecurity.net>, Tycho Andersen <tycho@...ker.com>, Laura Abbott <labbott@...hat.com>, Mark Rutland <mark.rutland@....com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, X86 ML <x86@...nel.org> Subject: Re: [PATCH RFC v4 0/3] Introduce the STACKLEAK feature and a test for it On Wed, Oct 4, 2017 at 3:55 PM, Alexander Popov <alex.popov@...ux.com> wrote: > This is the 4th version of the patch introducing STACKLEAK to the mainline > kernel. STACKLEAK is a security feature developed by Grsecurity/PaX (kudos > to them), which: I'm working on some entry changes that could potentially interact with this. I'll try to get them out for review soon.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.