lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 24 Feb 2016 08:40:54 +0100 From: Ingo Molnar <mingo@...nel.org> To: Josh Poimboeuf <jpoimboe@...hat.com> Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, x86@...nel.org, linux-kernel@...r.kernel.org, live-patching@...r.kernel.org, Michal Marek <mmarek@...e.cz>, Peter Zijlstra <peterz@...radead.org>, Andy Lutomirski <luto@...nel.org>, Borislav Petkov <bp@...en8.de>, Linus Torvalds <torvalds@...ux-foundation.org>, Andi Kleen <andi@...stfloor.org>, Pedro Alves <palves@...hat.com>, Namhyung Kim <namhyung@...il.com>, Bernd Petrovitsch <bernd@...rovitsch.priv.at>, Chris J Arges <chris.j.arges@...onical.com>, Andrew Morton <akpm@...ux-foundation.org>, Jiri Slaby <jslaby@...e.cz>, Arnaldo Carvalho de Melo <acme@...nel.org>, David Vrabel <david.vrabel@...rix.com>, Borislav Petkov <bp@...e.de>, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, Boris Ostrovsky <boris.ostrovsky@...cle.com>, Jeremy Fitzhardinge <jeremy@...p.org>, Chris Wright <chrisw@...s-sol.org>, Alok Kataria <akataria@...are.com>, Rusty Russell <rusty@...tcorp.com.au>, Herbert Xu <herbert@...dor.apana.org.au>, "David S. Miller" <davem@...emloft.net>, Pavel Machek <pavel@....cz>, "Rafael J. Wysocki" <rafael.j.wysocki@...el.com>, Len Brown <len.brown@...el.com>, Matt Fleming <matt@...eblueprint.co.uk>, Alexei Starovoitov <ast@...nel.org>, netdev@...r.kernel.org, Ananth N Mavinakayanahalli <ananth@...ibm.com>, Anil S Keshavamurthy <anil.s.keshavamurthy@...el.com>, Masami Hiramatsu <masami.hiramatsu.pt@...achi.com>, Gleb Natapov <gleb@...nel.org>, Paolo Bonzini <pbonzini@...hat.com>, kvm@...r.kernel.org, Wim Van Sebroeck <wim@...ana.be>, Guenter Roeck <linux@...ck-us.net>, linux-watchdog@...r.kernel.org, Waiman Long <Waiman.Long@....com> Subject: Re: [PATCH 00/33] Compile-time stack metadata validation * Josh Poimboeuf <jpoimboe@...hat.com> wrote: > Hi Ingo, > > On Tue, Feb 23, 2016 at 09:14:06AM +0100, Ingo Molnar wrote: > > So I tried out this latest stacktool series and it looks mostly good for an > > upstream merge. > > > > To help this effort move forward I've applied the preparatory/fix patches that are > > part of this series to tip:x86/debug - that's 26 out of 31 patches. (I've > > propagated all the acks that the latest submission got into the changelogs.) > > Thanks very much for your review and for applying the fixes! > > A few issues relating to the merge: > > - The tip:x86/debug branch fails to build because it depends on > ec5186557abb ("x86/asm: Add C versions of frame pointer macros") which > is in tip:x86/asm. Indeed... > - As Pavel mentioned, the tip-bot seems to be spitting out garbage > emails from: > =?UTF-8?B?dGlwLWJvdCBmb3IgSm9zaCBQb2ltYm9ldWYgPHRpcGJvdEB6eXRvci5jb20+?=@...or.com. Yeah, hpa fixed that meanwhile. Due to the above bad base I rebased the tree (to a x86/asm base), so there will be a new round of (hopefully readable) tip-bot notifications. I'll push it out after a bit of testing. > > 5) > > > > Likewise, I think the CONFIG_STACK_VALIDATION=y Kconfig flag does not express that > > we do exception table checks as well - and it does not express all the other > > things we may check in object files in the future. > > > > Something like CONFIG_CHECK_OBJECT_FILES=y would express it, and the help text > > would list all the things the tool is able to checks for at the moment. > > Hm, I'm not really sure about this. Yes, the tool could potentially do > other types of checks, but is it necessary to lump them all together > into a single config option? It does have subcommands after all ;-) lol ;-) Ok, I'm fine with CONFIG_STACK_VALIDATION=y as well. Thanks, Ingo
Powered by blists - more mailing lists