lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <5A2FBC570200007800196B3E@prv-mh.provo.novell.com> Date: Tue, 12 Dec 2017 03:24:07 -0700 From: "Jan Beulich" <JBeulich@...e.com> To: <mingo@...e.hu>, <tglx@...utronix.de>, "Boris Ostrovsky" <boris.ostrovsky@...cle.com>, "Juergen Gross" <jgross@...e.com>, <hpa@...or.com> Cc: "xen-devel" <xen-devel@...ts.xenproject.org>, <linux-kernel@...r.kernel.org> Subject: [PATCH 0/2] x86: deal with remaining W+X pages on Xen The two patches here are entirely independent (i.e. they could by applied in any order and/or go through separate trees), but for the warning to go away both are necessary. 1: x86: consider effective protection attributes in W+X check 2: x86-64/Xen: eliminate W+X pages Signed-off-by: Jan Beulich <jbeulich@...e.com>
Powered by blists - more mailing lists