Date: Tue, 6 Sep 2016 09:40:08 -0700 From: Andy Lutomirski <luto@...capital.net> To: Jann Horn <jann@...jh.net> Cc: Linus Torvalds <torvalds@...ux-foundation.org>, Oleg Nesterov <oleg@...hat.com>, Andy Lutomirski <luto@...nel.org>, "the arch/x86 maintainers" <x86@...nel.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "linux-arch@...r.kernel.org" <linux-arch@...r.kernel.org>, Borislav Petkov <bp@...en8.de>, Nadav Amit <nadav.amit@...il.com>, Kees Cook <keescook@...omium.org>, Brian Gerst <brgerst@...il.com>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Josh Poimboeuf <jpoimboe@...hat.com>, Heiko Carstens <heiko.carstens@...ibm.com> Subject: Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core) On Tue, Sep 6, 2016 at 9:19 AM, Jann Horn <jann@...jh.net> wrote: > On Thu, Jun 23, 2016 at 09:41:11AM -0700, Andy Lutomirski wrote: >> 3. Free stacks immediately and cache them (really easy). > > Random note: task_current_syscall() (via /proc/$pid/syscall) will probably need additional > locking when the stack is freed before the task. Thanks. I'm testing a patch now. -- Andy Lutomirski AMA Capital Management, LLC
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.