lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 30 Aug 2007 18:05:38 -0700 From: Andrew Morton <akpm@...ux-foundation.org> To: Jiri Kosina <jkosina@...e.cz> Cc: Mike Frysinger <vapier.adi@...il.com>, linux-kernel@...r.kernel.org Subject: Re: [PATCH] i386 and x86_64: randomize brk() On Thu, 30 Aug 2007 17:10:03 +0200 (CEST) Jiri Kosina <jkosina@...e.cz> wrote: > On Thu, 30 Aug 2007, Mike Frysinger wrote: > > > Blackfin too please :) i think v850 also falls into this category, but > > i'm not terribly familiar with it ... > > Andrew, do you still strongly oppose to having ARCH_HAS_RANDOMIZE_BRK > macro instead please? > Not strongly, but the general opinion seems to be that ARCH_HAS_FOO is sucky. It should at least be done in Kconfig rather than in .h, but even better is just to implement the thing for all architectures. Please ask checkpatch.pl about you patch, too. It has commonly-occurring coding mishaps. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists