From 773d1e08893679eb2034e90ae186b66c410e6426 Mon Sep 17 00:00:00 2001 From: Greg Kroah-Hartman Date: Wed, 24 May 2017 14:52:48 +0200 Subject: [PATCH] drop queue-4.4/stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch --- queue-4.4/series | 1 - ...-bits-to-64-bits-on-64-bit-platforms.patch | 40 ------------------- 2 files changed, 41 deletions(-) delete mode 100644 queue-4.4/stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch diff --git a/queue-4.4/series b/queue-4.4/series index bdd30661850..461a4bb04f4 100644 --- a/queue-4.4/series +++ b/queue-4.4/series @@ -90,7 +90,6 @@ staging-rtl8192e-rtl92e_get_eeprom_size-fix-read-size-of-eprom_cmd.patch iommu-vt-d-flush-the-iotlb-to-get-rid-of-the-initial-kdump-mappings.patch metag-uaccess-fix-access_ok.patch metag-uaccess-check-access_ok-in-strncpy_from_user.patch -stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch uwb-fix-device-quirk-on-big-endian-hosts.patch genirq-fix-chained-interrupt-data-ordering.patch osf_wait4-fix-infoleak.patch diff --git a/queue-4.4/stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch b/queue-4.4/stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch deleted file mode 100644 index cbb596e3e57..00000000000 --- a/queue-4.4/stackprotector-increase-the-per-task-stack-canary-s-random-range-from-32-bits-to-64-bits-on-64-bit-platforms.patch +++ /dev/null @@ -1,40 +0,0 @@ -From 5ea30e4e58040cfd6434c2f33dc3ea76e2c15b05 Mon Sep 17 00:00:00 2001 -From: Daniel Micay -Date: Thu, 4 May 2017 09:32:09 -0400 -Subject: stackprotector: Increase the per-task stack canary's random range from 32 bits to 64 bits on 64-bit platforms - -From: Daniel Micay - -commit 5ea30e4e58040cfd6434c2f33dc3ea76e2c15b05 upstream. - -The stack canary is an 'unsigned long' and should be fully initialized to -random data rather than only 32 bits of random data. - -Signed-off-by: Daniel Micay -Acked-by: Arjan van de Ven -Acked-by: Rik van Riel -Acked-by: Kees Cook -Cc: Arjan van Ven -Cc: Linus Torvalds -Cc: Peter Zijlstra -Cc: Thomas Gleixner -Cc: kernel-hardening@lists.openwall.com -Link: http://lkml.kernel.org/r/20170504133209.3053-1-danielmicay@gmail.com -Signed-off-by: Ingo Molnar -Signed-off-by: Greg Kroah-Hartman - ---- - kernel/fork.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - ---- a/kernel/fork.c -+++ b/kernel/fork.c -@@ -368,7 +368,7 @@ static struct task_struct *dup_task_stru - set_task_stack_end_magic(tsk); - - #ifdef CONFIG_CC_STACKPROTECTOR -- tsk->stack_canary = get_random_int(); -+ tsk->stack_canary = get_random_long(); - #endif - - /* -- 2.47.3