All of lore.kernel.org
 help / color / mirror / Atom feed
From: Eric Auger <eric.auger@redhat.com>
To: Marc Zyngier <maz@kernel.org>, Kees Cook <keescook@chromium.org>
Cc: linux-hardening@vger.kernel.org,
	Oliver Upton <oliver.upton@linux.dev>,
	James Morse <james.morse@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	Zenghui Yu <yuzenghui@huawei.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will@kernel.org>, Reiji Watanabe <reijiw@google.com>,
	Ricardo Koller <ricarkol@google.com>,
	Raghavendra Rao Ananta <rananta@google.com>,
	Quentin Perret <qperret@google.com>,
	Jean-Philippe Brucker <jean-philippe@linaro.org>,
	linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
	"Gustavo A. R. Silva" <gustavoars@kernel.org>,
	Bill Wendling <morbo@google.com>,
	Justin Stitt <justinstitt@google.com>,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH 24/82] KVM: arm64: vgic: Refactor intentional wrap-around calculation
Date: Wed, 24 Jan 2024 16:13:48 +0100	[thread overview]
Message-ID: <86b9e255-9d19-44ee-b6c4-544507756183@redhat.com> (raw)
In-Reply-To: <86o7dc8gu5.wl-maz@kernel.org>



On 1/23/24 11:49, Marc Zyngier wrote:
> On Tue, 23 Jan 2024 00:26:59 +0000,
> Kees Cook <keescook@chromium.org> wrote:
>> In an effort to separate intentional arithmetic wrap-around from
>> unexpected wrap-around, we need to refactor places that depend on this
>> kind of math. One of the most common code patterns of this is:
>>
>> 	VAR + value < VAR
>>
>> Notably, this is considered "undefined behavior" for signed and pointer
>> types, which the kernel works around by using the -fno-strict-overflow
>> option in the build[1] (which used to just be -fwrapv). Regardless, we
>> want to get the kernel source to the position where we can meaningfully
>> instrument arithmetic wrap-around conditions and catch them when they
>> are unexpected, regardless of whether they are signed[2], unsigned[3],
>> or pointer[4] types.
>>
>> Refactor open-coded unsigned wrap-around addition test to use
>> check_add_overflow(), retaining the result for later usage (which removes
>> the redundant open-coded addition). This paves the way to enabling the
>> wrap-around sanitizers in the future.
>>
>> Link: https://git.kernel.org/linus/68df3755e383e6fecf2354a67b08f92f18536594 [1]
>> Link: https://github.com/KSPP/linux/issues/26 [2]
>> Link: https://github.com/KSPP/linux/issues/27 [3]
>> Link: https://github.com/KSPP/linux/issues/344 [4]
>> Cc: Marc Zyngier <maz@kernel.org>
>> Cc: Oliver Upton <oliver.upton@linux.dev>
>> Cc: James Morse <james.morse@arm.com>
>> Cc: Suzuki K Poulose <suzuki.poulose@arm.com>
>> Cc: Zenghui Yu <yuzenghui@huawei.com>
>> Cc: Catalin Marinas <catalin.marinas@arm.com>
>> Cc: Will Deacon <will@kernel.org>
>> Cc: Reiji Watanabe <reijiw@google.com>
>> Cc: Eric Auger <eric.auger@redhat.com>
>> Cc: Ricardo Koller <ricarkol@google.com>
>> Cc: Raghavendra Rao Ananta <rananta@google.com>
>> Cc: Quentin Perret <qperret@google.com>
>> Cc: Jean-Philippe Brucker <jean-philippe@linaro.org>
>> Cc: linux-arm-kernel@lists.infradead.org
>> Cc: kvmarm@lists.linux.dev
>> Signed-off-by: Kees Cook <keescook@chromium.org>
>> ---
>>  arch/arm64/kvm/vgic/vgic-kvm-device.c |  6 ++++--
>>  arch/arm64/kvm/vgic/vgic-v2.c         | 10 ++++++----
>>  2 files changed, 10 insertions(+), 6 deletions(-)
>>
>> diff --git a/arch/arm64/kvm/vgic/vgic-kvm-device.c b/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> index f48b8dab8b3d..0eec5344d203 100644
>> --- a/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> +++ b/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> @@ -18,17 +18,19 @@ int vgic_check_iorange(struct kvm *kvm, phys_addr_t ioaddr,
>>  		       phys_addr_t addr, phys_addr_t alignment,
>>  		       phys_addr_t size)
>>  {
>> +	phys_addr_t sum;
>> +
>>  	if (!IS_VGIC_ADDR_UNDEF(ioaddr))
>>  		return -EEXIST;
>>  
>>  	if (!IS_ALIGNED(addr, alignment) || !IS_ALIGNED(size, alignment))
>>  		return -EINVAL;
>>  
>> -	if (addr + size < addr)
>> +	if (check_add_overflow(addr, size, &sum))
>>  		return -EINVAL;
>>  
>>  	if (addr & ~kvm_phys_mask(&kvm->arch.mmu) ||
>> -	    (addr + size) > kvm_phys_size(&kvm->arch.mmu))
>> +	    sum > kvm_phys_size(&kvm->arch.mmu))
> nit: 'sum' doesn't mean much in this context. Something like 'end'
> would be much more descriptive.
>
>>  		return -E2BIG;
>>  
>>  	return 0;
>> diff --git a/arch/arm64/kvm/vgic/vgic-v2.c b/arch/arm64/kvm/vgic/vgic-v2.c
>> index 7e9cdb78f7ce..c8d1e965d3b7 100644
>> --- a/arch/arm64/kvm/vgic/vgic-v2.c
>> +++ b/arch/arm64/kvm/vgic/vgic-v2.c
>> @@ -273,14 +273,16 @@ void vgic_v2_enable(struct kvm_vcpu *vcpu)
>>  /* check for overlapping regions and for regions crossing the end of memory */
>>  static bool vgic_v2_check_base(gpa_t dist_base, gpa_t cpu_base)
>>  {
>> -	if (dist_base + KVM_VGIC_V2_DIST_SIZE < dist_base)
>> +	gpa_t dist_sum, cpu_sum;
> Same here: dist_end, cpu_end.
I do agree.
>
>> +
>> +	if (check_add_overflow(dist_base, KVM_VGIC_V2_DIST_SIZE, &dist_sum))
>>  		return false;
>> -	if (cpu_base + KVM_VGIC_V2_CPU_SIZE < cpu_base)
>> +	if (check_add_overflow(cpu_base, KVM_VGIC_V2_CPU_SIZE, &cpu_sum))
>>  		return false;
>>  
>> -	if (dist_base + KVM_VGIC_V2_DIST_SIZE <= cpu_base)
>> +	if (dist_sum <= cpu_base)
>>  		return true;
>> -	if (cpu_base + KVM_VGIC_V2_CPU_SIZE <= dist_base)
>> +	if (cpu_sum <= dist_base)
>>  		return true;
>>  
>>  	return false;
> With these nits addressed, and assuming you intend to merge the whole
> series yourself:
>
> Acked-by: Marc Zyngier <maz@kernel.org>
assuming above suggested changes,

Reviewed-by: Eric Auger <eric.auger@redhat.com>

Eric
>
> 	M.
>


WARNING: multiple messages have this Message-ID (diff)
From: Eric Auger <eric.auger@redhat.com>
To: Marc Zyngier <maz@kernel.org>, Kees Cook <keescook@chromium.org>
Cc: linux-hardening@vger.kernel.org,
	Oliver Upton <oliver.upton@linux.dev>,
	James Morse <james.morse@arm.com>,
	Suzuki K Poulose <suzuki.poulose@arm.com>,
	Zenghui Yu <yuzenghui@huawei.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will@kernel.org>, Reiji Watanabe <reijiw@google.com>,
	Ricardo Koller <ricarkol@google.com>,
	Raghavendra Rao Ananta <rananta@google.com>,
	Quentin Perret <qperret@google.com>,
	Jean-Philippe Brucker <jean-philippe@linaro.org>,
	linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
	"Gustavo A. R. Silva" <gustavoars@kernel.org>,
	Bill Wendling <morbo@google.com>,
	Justin Stitt <justinstitt@google.com>,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH 24/82] KVM: arm64: vgic: Refactor intentional wrap-around calculation
Date: Wed, 24 Jan 2024 16:13:48 +0100	[thread overview]
Message-ID: <86b9e255-9d19-44ee-b6c4-544507756183@redhat.com> (raw)
In-Reply-To: <86o7dc8gu5.wl-maz@kernel.org>



On 1/23/24 11:49, Marc Zyngier wrote:
> On Tue, 23 Jan 2024 00:26:59 +0000,
> Kees Cook <keescook@chromium.org> wrote:
>> In an effort to separate intentional arithmetic wrap-around from
>> unexpected wrap-around, we need to refactor places that depend on this
>> kind of math. One of the most common code patterns of this is:
>>
>> 	VAR + value < VAR
>>
>> Notably, this is considered "undefined behavior" for signed and pointer
>> types, which the kernel works around by using the -fno-strict-overflow
>> option in the build[1] (which used to just be -fwrapv). Regardless, we
>> want to get the kernel source to the position where we can meaningfully
>> instrument arithmetic wrap-around conditions and catch them when they
>> are unexpected, regardless of whether they are signed[2], unsigned[3],
>> or pointer[4] types.
>>
>> Refactor open-coded unsigned wrap-around addition test to use
>> check_add_overflow(), retaining the result for later usage (which removes
>> the redundant open-coded addition). This paves the way to enabling the
>> wrap-around sanitizers in the future.
>>
>> Link: https://git.kernel.org/linus/68df3755e383e6fecf2354a67b08f92f18536594 [1]
>> Link: https://github.com/KSPP/linux/issues/26 [2]
>> Link: https://github.com/KSPP/linux/issues/27 [3]
>> Link: https://github.com/KSPP/linux/issues/344 [4]
>> Cc: Marc Zyngier <maz@kernel.org>
>> Cc: Oliver Upton <oliver.upton@linux.dev>
>> Cc: James Morse <james.morse@arm.com>
>> Cc: Suzuki K Poulose <suzuki.poulose@arm.com>
>> Cc: Zenghui Yu <yuzenghui@huawei.com>
>> Cc: Catalin Marinas <catalin.marinas@arm.com>
>> Cc: Will Deacon <will@kernel.org>
>> Cc: Reiji Watanabe <reijiw@google.com>
>> Cc: Eric Auger <eric.auger@redhat.com>
>> Cc: Ricardo Koller <ricarkol@google.com>
>> Cc: Raghavendra Rao Ananta <rananta@google.com>
>> Cc: Quentin Perret <qperret@google.com>
>> Cc: Jean-Philippe Brucker <jean-philippe@linaro.org>
>> Cc: linux-arm-kernel@lists.infradead.org
>> Cc: kvmarm@lists.linux.dev
>> Signed-off-by: Kees Cook <keescook@chromium.org>
>> ---
>>  arch/arm64/kvm/vgic/vgic-kvm-device.c |  6 ++++--
>>  arch/arm64/kvm/vgic/vgic-v2.c         | 10 ++++++----
>>  2 files changed, 10 insertions(+), 6 deletions(-)
>>
>> diff --git a/arch/arm64/kvm/vgic/vgic-kvm-device.c b/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> index f48b8dab8b3d..0eec5344d203 100644
>> --- a/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> +++ b/arch/arm64/kvm/vgic/vgic-kvm-device.c
>> @@ -18,17 +18,19 @@ int vgic_check_iorange(struct kvm *kvm, phys_addr_t ioaddr,
>>  		       phys_addr_t addr, phys_addr_t alignment,
>>  		       phys_addr_t size)
>>  {
>> +	phys_addr_t sum;
>> +
>>  	if (!IS_VGIC_ADDR_UNDEF(ioaddr))
>>  		return -EEXIST;
>>  
>>  	if (!IS_ALIGNED(addr, alignment) || !IS_ALIGNED(size, alignment))
>>  		return -EINVAL;
>>  
>> -	if (addr + size < addr)
>> +	if (check_add_overflow(addr, size, &sum))
>>  		return -EINVAL;
>>  
>>  	if (addr & ~kvm_phys_mask(&kvm->arch.mmu) ||
>> -	    (addr + size) > kvm_phys_size(&kvm->arch.mmu))
>> +	    sum > kvm_phys_size(&kvm->arch.mmu))
> nit: 'sum' doesn't mean much in this context. Something like 'end'
> would be much more descriptive.
>
>>  		return -E2BIG;
>>  
>>  	return 0;
>> diff --git a/arch/arm64/kvm/vgic/vgic-v2.c b/arch/arm64/kvm/vgic/vgic-v2.c
>> index 7e9cdb78f7ce..c8d1e965d3b7 100644
>> --- a/arch/arm64/kvm/vgic/vgic-v2.c
>> +++ b/arch/arm64/kvm/vgic/vgic-v2.c
>> @@ -273,14 +273,16 @@ void vgic_v2_enable(struct kvm_vcpu *vcpu)
>>  /* check for overlapping regions and for regions crossing the end of memory */
>>  static bool vgic_v2_check_base(gpa_t dist_base, gpa_t cpu_base)
>>  {
>> -	if (dist_base + KVM_VGIC_V2_DIST_SIZE < dist_base)
>> +	gpa_t dist_sum, cpu_sum;
> Same here: dist_end, cpu_end.
I do agree.
>
>> +
>> +	if (check_add_overflow(dist_base, KVM_VGIC_V2_DIST_SIZE, &dist_sum))
>>  		return false;
>> -	if (cpu_base + KVM_VGIC_V2_CPU_SIZE < cpu_base)
>> +	if (check_add_overflow(cpu_base, KVM_VGIC_V2_CPU_SIZE, &cpu_sum))
>>  		return false;
>>  
>> -	if (dist_base + KVM_VGIC_V2_DIST_SIZE <= cpu_base)
>> +	if (dist_sum <= cpu_base)
>>  		return true;
>> -	if (cpu_base + KVM_VGIC_V2_CPU_SIZE <= dist_base)
>> +	if (cpu_sum <= dist_base)
>>  		return true;
>>  
>>  	return false;
> With these nits addressed, and assuming you intend to merge the whole
> series yourself:
>
> Acked-by: Marc Zyngier <maz@kernel.org>
assuming above suggested changes,

Reviewed-by: Eric Auger <eric.auger@redhat.com>

Eric
>
> 	M.
>


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2024-01-24 15:13 UTC|newest]

Thread overview: 192+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-01-23  0:26 [PATCH 00/82] overflow: Refactor open-coded arithmetic wrap-around Kees Cook
2024-01-23  0:26 ` [PATCH 01/82] overflow: Expand check_add_overflow() for pointer addition Kees Cook
2024-01-26 22:52   ` Justin Stitt
2024-01-26 22:57     ` Kees Cook
2024-01-23  0:26 ` [PATCH 02/82] overflow: Introduce add_would_overflow() Kees Cook
2024-01-23  8:03   ` Rasmus Villemoes
2024-01-23 21:38     ` Kees Cook
2024-01-23  0:26 ` [PATCH 03/82] overflow: Introduce add_wrap() Kees Cook
2024-01-23  8:14   ` Rasmus Villemoes
2024-01-23 21:51     ` Kees Cook
2024-01-23  9:22   ` Mark Rutland
2024-01-23 21:52     ` Kees Cook
2024-01-23  0:26 ` [PATCH 04/82] docs: deprecated.rst: deprecate open-coded arithmetic wrap-around Kees Cook
2024-01-23  0:26 ` [PATCH 05/82] cocci: Refactor " Kees Cook
2024-01-23  0:26   ` [cocci] " Kees Cook
2024-01-23  0:26 ` [PATCH 06/82] overflow: Reintroduce signed and unsigned overflow sanitizers Kees Cook
2024-01-23  2:24   ` Miguel Ojeda
2024-01-23  4:45     ` Kees Cook
2024-01-23 11:20       ` Miguel Ojeda
2024-01-23  0:26 ` [PATCH 07/82] overflow: Introduce CONFIG_UBSAN_POINTER_WRAP Kees Cook
2024-01-23  0:26 ` [PATCH 08/82] iov_iter: Avoid wrap-around instrumentation in copy_compat_iovec_from_user Kees Cook
2024-01-23  0:26 ` [PATCH 09/82] select: Avoid wrap-around instrumentation in do_sys_poll() Kees Cook
2024-01-23 18:00   ` Jan Kara
2024-01-23  0:26 ` [PATCH 10/82] locking/atomic/x86: Silence intentional wrapping addition Kees Cook
2024-01-23  9:27   ` Mark Rutland
2024-01-23 21:54     ` Kees Cook
2024-01-23  0:26 ` [PATCH 11/82] arm64: atomics: lse: " Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23  9:53   ` Mark Rutland
2024-01-23  9:53     ` Mark Rutland
2024-01-23  0:26 ` [PATCH 12/82] ipv4: " Kees Cook
2024-01-23  0:26 ` [PATCH 13/82] btrfs: Refactor intentional wrap-around calculation Kees Cook
2024-01-23  1:45   ` David Sterba
2024-01-23  0:26 ` [PATCH 14/82] smb: client: " Kees Cook
2024-01-23  0:26 ` [PATCH 15/82] dma-buf: " Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23  0:26 ` [PATCH 16/82] drm/nouveau/mmu: " Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23  0:26 ` [PATCH 17/82] drm/vc4: " Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23  0:26 ` [PATCH 18/82] ext4: " Kees Cook
2024-01-23  0:26 ` [PATCH 19/82] fs: " Kees Cook
2024-01-23 18:01   ` Jan Kara
2024-01-23  0:26 ` [PATCH 20/82] fpga: dfl: " Kees Cook
2024-01-23  0:26 ` [PATCH 21/82] drivers/fsi: " Kees Cook
2024-01-23  0:26 ` [PATCH 22/82] x86/sgx: " Kees Cook
2024-01-23  9:15   ` Jarkko Sakkinen
2024-01-23  0:26 ` [PATCH 23/82] KVM: " Kees Cook
2024-01-24 16:25   ` Sean Christopherson
2024-01-23  0:26 ` [PATCH 24/82] KVM: arm64: vgic: " Kees Cook
2024-01-23  0:26   ` Kees Cook
2024-01-23 10:49   ` Marc Zyngier
2024-01-23 10:49     ` Marc Zyngier
2024-01-24 15:13     ` Eric Auger [this message]
2024-01-24 15:13       ` Eric Auger
2024-01-23  0:27 ` [PATCH 25/82] KVM: SVM: " Kees Cook
2024-01-24 16:15   ` Sean Christopherson
2024-01-23  0:27 ` [PATCH 26/82] buildid: " Kees Cook
2024-01-23  0:27 ` [PATCH 27/82] m68k: " Kees Cook
2024-01-23  2:29   ` Liam R. Howlett
2024-01-23  8:13   ` Geert Uytterhoeven
2024-01-23 13:29     ` Eero Tamminen
2024-01-23 13:42       ` Geert Uytterhoeven
2024-01-23  0:27 ` [PATCH 28/82] niu: " Kees Cook
2024-01-23  0:27 ` [PATCH 29/82] rds: " Kees Cook
2024-01-23  0:27 ` [PATCH 30/82] s390/kexec_file: " Kees Cook
2024-01-31 14:22   ` Alexander Gordeev
2024-01-31 14:40     ` Sven Schnelle
2024-01-23  0:27 ` [PATCH 31/82] ARC: dw2 unwind: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 32/82] vringh: " Kees Cook
2024-01-26 19:31   ` Eugenio Perez Martin
2024-01-26 19:42     ` Kees Cook
2024-01-23  0:27 ` [PATCH 33/82] mm/vmalloc: " Kees Cook
2024-01-30 18:55   ` Lorenzo Stoakes
2024-01-30 19:54     ` Uladzislau Rezki
2024-01-30 21:57       ` Kees Cook
2024-01-31  9:44         ` Uladzislau Rezki
2024-01-23  0:27 ` [PATCH 34/82] ipc: " Kees Cook
2024-01-23  1:07   ` Linus Torvalds
2024-01-23  1:38     ` Kees Cook
2024-01-23 18:06       ` Linus Torvalds
2024-01-23 19:00         ` Kees Cook
2024-01-23  0:27 ` [PATCH 35/82] ACPI: custom_method: Refactor intentional wrap-around test Kees Cook
2024-01-24 19:52   ` Rafael J. Wysocki
2024-01-24 20:16     ` Kees Cook
2024-01-23  0:27 ` [PATCH 36/82] agp: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 37/82] aio: " Kees Cook
2024-01-23 15:30   ` Christian Brauner
2024-01-23 18:03   ` Jan Kara
2024-01-23  0:27 ` [PATCH 38/82] arm: 3117/1: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  9:56   ` Mark Rutland
2024-01-23  9:56     ` Mark Rutland
2024-01-23 22:41     ` Kees Cook
2024-01-23 22:41       ` Kees Cook
2024-01-23  0:27 ` [PATCH 39/82] crypto: " Kees Cook
2024-01-23  0:27 ` [PATCH 40/82] arm64: stacktrace: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  9:58   ` Mark Rutland
2024-01-23  9:58     ` Mark Rutland
2024-01-23  0:27 ` [PATCH 41/82] wil6210: " Kees Cook
2024-01-23  6:36   ` Kalle Valo
2024-01-23 11:50   ` Kalle Valo
2024-01-23 22:52     ` Kees Cook
2024-01-23  0:27 ` [PATCH 42/82] bcachefs: " Kees Cook
2024-01-23  6:36   ` Kent Overstreet
2024-01-23  0:27 ` [PATCH 43/82] bpf: " Kees Cook
2024-01-23  4:00   ` Yonghong Song
2024-01-23  4:07     ` Kees Cook
2024-01-23  5:13       ` Yonghong Song
2024-01-23  0:27 ` [PATCH 44/82] btrfs: " Kees Cook
2024-01-23 18:00   ` David Sterba
2024-01-23  0:27 ` [PATCH 45/82] cifs: " Kees Cook
2024-01-23  0:27 ` [PATCH 46/82] crypto: " Kees Cook
2024-01-23  3:07   ` Eric Biggers
2024-01-23  3:29     ` Kees Cook
2024-01-23  0:27 ` [PATCH 47/82] dm verity: " Kees Cook
2024-01-30 18:58   ` Mike Snitzer
2024-01-23  0:27 ` [PATCH 48/82] drm/nouveau/mmu: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 49/82] drm/i915: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 50/82] drm/vc4: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 51/82] ext4: " Kees Cook
2024-01-23  0:27 ` [PATCH 52/82] f2fs: " Kees Cook
2024-01-23  0:27   ` [f2fs-dev] " Kees Cook
2024-01-23  0:27 ` [PATCH 53/82] fs: " Kees Cook
2024-01-23 18:02   ` Jan Kara
2024-01-23  0:27 ` [PATCH 54/82] hpfs: " Kees Cook
2024-01-23  0:27 ` [PATCH 55/82] kasan: " Kees Cook
2024-01-25 22:35   ` Andrey Konovalov
2024-01-23  0:27 ` [PATCH 56/82] usercopy: " Kees Cook
2024-01-23  0:27 ` [PATCH 57/82] KVM: arm64: vgic-v3: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23 10:50   ` Marc Zyngier
2024-01-23 10:50     ` Marc Zyngier
2024-01-24 15:12   ` Eric Auger
2024-01-24 15:12     ` Eric Auger
2024-01-23  0:27 ` [PATCH 58/82] s390/mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 59/82] lib/scatterlist: " Kees Cook
2024-01-23  0:27 ` [PATCH 60/82] powerpc: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-02-12  5:38   ` Michael Ellerman
2024-02-12  5:38     ` Michael Ellerman
2024-01-23  0:27 ` [PATCH 61/82] scsi: mpt3sas: " Kees Cook
2024-01-23  0:27 ` [PATCH 62/82] mwifiex: pcie: " Kees Cook
2024-01-23  6:36   ` Kalle Valo
2024-01-23  0:27 ` [PATCH 63/82] mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 64/82] netfilter: " Kees Cook
2024-01-23 18:03   ` Florian Westphal
2024-01-23  0:27 ` [PATCH 65/82] nios2: " Kees Cook
2024-01-23 13:15   ` Dinh Nguyen
2024-01-23  0:27 ` [PATCH 66/82] fs/ntfs3: " Kees Cook
2024-01-23  0:27 ` [PATCH 67/82] ocfs2: " Kees Cook
2024-01-23  0:27 ` [PATCH 68/82] PCI: " Kees Cook
2024-01-23  0:27 ` [PATCH 69/82] perf tools: " Kees Cook
2024-01-23  6:21   ` Adrian Hunter
2024-01-23 21:31     ` Kees Cook
2024-01-23  0:27 ` [PATCH 70/82] remoteproc: " Kees Cook
2024-02-06 18:55   ` Bjorn Andersson
2024-01-23  0:27 ` [PATCH 71/82] s390/mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 72/82] scsi: sd_zbc: " Kees Cook
2024-01-23  0:27 ` [PATCH 73/82] sh: " Kees Cook
2024-01-23  7:31   ` John Paul Adrian Glaubitz
2024-01-23  0:27 ` [PATCH 74/82] ARC: dw2 unwind: " Kees Cook
2024-01-23  0:27   ` Kees Cook
2024-01-23  0:27 ` [PATCH 75/82] timekeeping: " Kees Cook
2024-01-23  1:06   ` John Stultz
2024-01-24 19:34   ` Thomas Gleixner
2024-01-23  0:27 ` [PATCH 76/82] udf: " Kees Cook
2024-01-23 17:14   ` Jan Kara
2024-01-23  0:27 ` [PATCH 77/82] virtio: " Kees Cook
2024-01-26 19:33   ` Eugenio Perez Martin
2024-01-23  0:27 ` [PATCH 78/82] mm/vmalloc: " Kees Cook
2024-01-30 18:56   ` Lorenzo Stoakes
2024-01-23  0:27 ` [PATCH 79/82] staging: vme_user: " Kees Cook
2024-01-23  0:27 ` [PATCH 80/82] xen-netback: " Kees Cook
2024-01-23  7:55   ` Jan Beulich
2024-01-23 21:32     ` Kees Cook
2024-01-23  0:27 ` [PATCH 81/82] lib: zstd: " Kees Cook
2024-01-23  0:27 ` [PATCH 82/82] mqueue: " Kees Cook
2024-01-23  2:22 ` [PATCH 00/82] overflow: Refactor open-coded arithmetic wrap-around Kent Overstreet
2024-01-23  2:51   ` Kees Cook
2024-01-23  9:46 ` Mark Rutland
2024-01-23 21:56   ` Kees Cook
2024-01-29  6:27   ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=86b9e255-9d19-44ee-b6c4-544507756183@redhat.com \
    --to=eric.auger@redhat.com \
    --cc=catalin.marinas@arm.com \
    --cc=gustavoars@kernel.org \
    --cc=james.morse@arm.com \
    --cc=jean-philippe@linaro.org \
    --cc=justinstitt@google.com \
    --cc=keescook@chromium.org \
    --cc=kvmarm@lists.linux.dev \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-hardening@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=maz@kernel.org \
    --cc=morbo@google.com \
    --cc=oliver.upton@linux.dev \
    --cc=qperret@google.com \
    --cc=rananta@google.com \
    --cc=reijiw@google.com \
    --cc=ricarkol@google.com \
    --cc=suzuki.poulose@arm.com \
    --cc=will@kernel.org \
    --cc=yuzenghui@huawei.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.