Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 Jun 2018 16:00:04 -0700
From: Kees Cook <>
To: Alexander Popov <>, Laura Abbott <>, 
	Ingo Molnar <>
Cc: Kernel Hardening <>, PaX Team <>, 
	Brad Spengler <>, Andy Lutomirski <>, 
	Tycho Andersen <>, Mark Rutland <>, 
	Ard Biesheuvel <>, Borislav Petkov <>, 
	Richard Sandiford <>, Thomas Gleixner <>, 
	"H . Peter Anvin" <>, Peter Zijlstra <>, 
	"Dmitry V . Levin" <>, Emese Revfy <>, Jonathan Corbet <>, 
	Andrey Ryabinin <>, 
	"Kirill A . Shutemov" <>, Thomas Garnier <>, 
	Andrew Morton <>, Alexei Starovoitov <>, Josef Bacik <>, 
	Masami Hiramatsu <>, Nicholas Piggin <>, 
	Al Viro <>, "David S . Miller" <>, 
	Ding Tianhong <>, David Woodhouse <>, 
	Josh Poimboeuf <>, Steven Rostedt <>, 
	Dominik Brodowski <>, Juergen Gross <>, 
	Linus Torvalds <>, 
	Greg Kroah-Hartman <>, Dan Williams <>, 
	Dave Hansen <>, Mathias Krause <>, 
	Vikas Shivappa <>, Kyle Huey <>, 
	Dmitry Safonov <>, Will Deacon <>, 
	Arnd Bergmann <>, Florian Weimer <>, 
	Boris Lukashev <>, Andrey Konovalov <>, 
	X86 ML <>, LKML <>
Subject: Re: [PATCH v13 0/6] Introduce the STACKLEAK feature and a test for it

On Sun, May 27, 2018 at 7:57 AM, Kees Cook <> wrote:
> On Sat, May 26, 2018 at 1:10 PM, Alexander Popov <> wrote:
>> This is the 13th version of the patch series introducing STACKLEAK to the
>> mainline kernel for x86. This version comes with style changes according to
>> the feedback from Ingo Molnar. Previous version discussion:
> Thanks for the update! I've pushed it to my tree for 0-day testing:

0-day has been happy with this tree, and with Ingo's freedback
addressed, I'd like to push this to -next after -rc2 is released (in
theory this coming Sunday). It needed some rebasing to -rc1, but it
was all trivial stuff in Kconfg and Makefile from the kbuild tree's

Ingo, how do things look to you now?

Laura, have you had a chance to refresh your arm64 bits to this tree?
I haven't had a chance to look at it myself.


Kees Cook
Pixel Security

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.