lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 06 Mar 2017 22:43:03 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: David Miller <davem@...emloft.net> CC: keescook@...omium.org, netdev@...r.kernel.org, fengguang.wu@...el.com, labbott@...hat.com, ast@...nel.org Subject: Re: [PATCH net] bpf: disable broken write protection on i386 On 03/06/2017 07:52 PM, David Miller wrote: > From: Daniel Borkmann <daniel@...earbox.net> > Date: Mon, 06 Mar 2017 19:35:47 +0100 > >> I can do a few more tests with the kernel I have. I'm also totally >> fine if we drop this patch; it's just rc1, so there's plenty of time >> till a final release. > > I would really prefer we get to the bottom of this rather than apply > the quick band-aid on this one. Ok, sounds reasonable.
Powered by blists - more mailing lists