lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190410112103.15170-1-elena.reshetova@intel.com> Date: Wed, 10 Apr 2019 14:21:02 +0300 From: Elena Reshetova <elena.reshetova@...el.com> To: luto@...nel.org Cc: linux-kernel@...r.kernel.org, luto@...capital.net, jpoimboe@...hat.com, keescook@...omium.org, jannh@...gle.com, enrico.perla@...el.com, mingo@...hat.com, bp@...en8.de, tglx@...utronix.de, peterz@...radead.org, gregkh@...uxfoundation.org, Elena Reshetova <elena.reshetova@...el.com> Subject: [PATCH 0/1] v2, randomize stack offset upon syscall Resending the patch since the first attempt never made it to lkml. changes in v2: - alloca() is changed to __builtin_alloca() in order to be compatible with 32 bit versions Elena Reshetova (1): x86/entry/64: randomize kernel stack offset upon syscall arch/Kconfig | 15 +++++++++++++++ arch/x86/Kconfig | 1 + arch/x86/entry/common.c | 13 +++++++++++++ 3 files changed, 29 insertions(+) -- 2.17.1
Powered by blists - more mailing lists