On 03/29/2016 01:59 PM, Andi Kleen wrote: > On Tue, Mar 29, 2016 at 01:53:26PM -0600, Scott Bauer wrote: >> This patch adds a sysctl argument to disable SROP protection. > > Sysctl needs to be documented in Documentation/sysctl/ > > Also negated sysctl is weird, normally they are positive (enable-xxx) > Sure, I can change it. This may be a dumb question: I want SROP to be enabled by default, and thus the new enable-xxx will be initialized to 1, that's fine, right?
- [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies Scott Bauer
- [PATCH v4 1/4] SROP Mitigation: Architecture indepe... Scott Bauer
- Re: [PATCH v4 1/4] SROP Mitigation: Architectur... Linus Torvalds
- Re: [PATCH v4 1/4] SROP Mitigation: Architectur... Eric W. Biederman
- [PATCH v4 2/4] x86: SROP Mitigation: Implement Sign... Scott Bauer
- [PATCH v4 3/4] Sysctl: SROP Mitigation: Add Sysctl ... Scott Bauer
- Re: [PATCH v4 3/4] Sysctl: SROP Mitigation: Add... Andi Kleen
- Re: [PATCH v4 3/4] Sysctl: SROP Mitigation:... Scotty Bauer
- Re: [PATCH v4 3/4] Sysctl: SROP Mitigat... Andi Kleen
- [PATCH v4 4/4] Documentation: SROP Mitigation: Add ... Scott Bauer
- Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cooki... Andy Lutomirski
- Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn C... Scotty Bauer
- Re: [PATCH v4 0/4] SROP Mitigation: Sigretu... Andy Lutomirski
- Re: [PATCH v4 0/4] SROP Mitigation: Sig... Linus Torvalds
- Re: [PATCH v4 0/4] SROP Mitigation... Scotty Bauer
- Re: [PATCH v4 0/4] SROP Mitiga... Eric W. Biederman
- Re: [kernel-hardening] Re: [PATCH v4 0/... Daniel Micay