Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCETrWhzZF0St_=xVQvntcDt4Hc9qYkXZ6dyhK+NTAy7-dVEA@mail.gmail.com>
Date: Wed, 4 Oct 2017 21:40:48 -0700
From: Andy Lutomirski <luto@...capital.net>
To: Alexander Popov <alex.popov@...ux.com>
Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Kees Cook <keescook@...omium.org>, 
	PaX Team <pageexec@...email.hu>, Brad Spengler <spender@...ecurity.net>, 
	Tycho Andersen <tycho@...ker.com>, Laura Abbott <labbott@...hat.com>, 
	Mark Rutland <mark.rutland@....com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, 
	X86 ML <x86@...nel.org>
Subject: Re: [PATCH RFC v4 0/3] Introduce the STACKLEAK feature and a test for it

On Wed, Oct 4, 2017 at 3:55 PM, Alexander Popov <alex.popov@...ux.com> wrote:
> This is the 4th version of the patch introducing STACKLEAK to the mainline
> kernel. STACKLEAK is a security feature developed by Grsecurity/PaX (kudos
> to them), which:

I'm working on some entry changes that could potentially interact with
this.  I'll try to get them out for review soon.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.