All of lore.kernel.org
 help / color / mirror / Atom feed
From: Kees Cook <keescook@chromium.org>
To: Daniel Micay <danielmicay@gmail.com>
Cc: "Ingo Molnar" <mingo@kernel.org>,
	"Thomas Garnier" <thgarnie@google.com>,
	"Martin Schwidefsky" <schwidefsky@de.ibm.com>,
	"Heiko Carstens" <heiko.carstens@de.ibm.com>,
	"Dave Hansen" <dave.hansen@intel.com>,
	"Arnd Bergmann" <arnd@arndb.de>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"David Howells" <dhowells@redhat.com>,
	"René Nyffenegger" <mail@renenyffenegger.ch>,
	"Andrew Morton" <akpm@linux-foundation.org>,
	"Paul E . McKenney" <paulmck@linux.vnet.ibm.com>,
	"Eric W . Biederman" <ebiederm@xmission.com>,
	"Oleg Nesterov" <oleg@redhat.com>,
	"Pavel Tikhomirov" <ptikhomirov@virtuozzo.com>,
	"Ingo Molnar" <mingo@redhat.com>,
	"H . Peter Anvin" <hpa@zytor.com>,
	"Andy Lutomirski" <luto@kernel.org>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	"Rik van Riel" <riel@redhat.com>,
	"Josh Poimboeuf" <jpoimboe@redhat.com>,
	"Borislav Petkov" <bp@alien8.de>,
	"Brian Gerst" <brgerst@gmail.com>,
	"Kirill A . Shutemov" <kirill.shutemov@linux.intel.com>,
	"Christian Borntraeger" <borntraeger@de.ibm.com>,
	"Russell King" <linux@armlinux.org.uk>,
	"Will Deacon" <will.deacon@arm.com>,
	"Catalin Marinas" <catalin.marinas@arm.com>,
	"Mark Rutland" <mark.rutland@arm.com>,
	"James Morse" <james.morse@arm.com>,
	linux-s390 <linux-s390@vger.kernel.org>,
	LKML <linux-kernel@vger.kernel.org>,
	"Linux API" <linux-api@vger.kernel.org>,
	"the arch/x86 maintainers" <x86@kernel.org>,
	"linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>,
	"Kernel Hardening" <kernel-hardening@lists.openwall.com>,
	"Linus Torvalds" <torvalds@linux-foundation.org>,
	"Peter Zijlstra" <a.p.zijlstra@chello.nl>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Mon, 8 May 2017 08:26:23 -0700	[thread overview]
Message-ID: <CAGXu5jL61K0bRSEg9a_LswNyrt3K1J57REbWVcvAXT54zWwtMA@mail.gmail.com> (raw)
In-Reply-To: <1494256932.1167.1.camel@gmail.com>

On Mon, May 8, 2017 at 8:22 AM, Daniel Micay <danielmicay@gmail.com> wrote:
> On Mon, 2017-05-08 at 09:52 +0200, Ingo Molnar wrote:
>>
>> ... it's just not usable in that form for a regular maintenance flow.
>>
>> So what would be more useful is to add a specific Sparse check that
>> only checks
>> KERNEL_DS, to add it as a regular (.config driven) build option and
>> make sure the
>> kernel build has zero warnings.
>>
>> From that point on we can declare that this kind of bug won't occur
>> anymore, if
>> the Sparse implementation of the check is correct.
>>
>> But there's a (big) problem with that development model: Sparse is not
>> part of the
>> kernel tree and adding a feature to it while making the kernel depend
>> on that
>> brand new feature is a logistical nightmare. The overhead is quite
>> similar to
>> adding new features to a compiler - it happens at a glacial pace and
>> is only done
>> for major features really, at considerable expense. I don't think this
>> is an
>> adequate model for 'extended syntax checking' of the kernel,
>> especially when it
>> comes to correctness that has such obvious security impact.
>>
>> Thanks,
>>
>>       Ingo
>
> There's the option of using GCC plugins now that the infrastructure was
> upstreamed from grsecurity. It can be used as part of the regular build
> process and as long as the analysis is pretty simple it shouldn't hurt
> compile time much.

Well, and that the situation may arise due to memory corruption, not
from poorly-matched set_fs() calls, which static analysis won't help
solve. We need to catch this bad kernel state because it is a very bad
state to run in.

-Kees

-- 
Kees Cook
Pixel Security

WARNING: multiple messages have this Message-ID (diff)
From: Kees Cook <keescook@chromium.org>
To: Daniel Micay <danielmicay@gmail.com>
Cc: "Ingo Molnar" <mingo@kernel.org>,
	"Thomas Garnier" <thgarnie@google.com>,
	"Martin Schwidefsky" <schwidefsky@de.ibm.com>,
	"Heiko Carstens" <heiko.carstens@de.ibm.com>,
	"Dave Hansen" <dave.hansen@intel.com>,
	"Arnd Bergmann" <arnd@arndb.de>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"David Howells" <dhowells@redhat.com>,
	"René Nyffenegger" <mail@renenyffenegger.ch>,
	"Andrew Morton" <akpm@linux-foundation.org>,
	"Paul E . McKenney" <paulmck@linux.vnet.ibm.com>,
	"Eric W . Biederman" <ebiederm@xmission.com>,
	"Oleg Nesterov" <oleg@redhat.com>,
	"Pavel Tikhomirov" <ptikhomirov@virtuozzo.com>,
	"Ingo Molnar" <mingo@redhat.com>,
	"H . Peter Anvin" <hpa@zytor.com>,
	"Andy Lutomirski" <luto@kernel.org>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	"Rik van Riel" <riel@redhat.com>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Mon, 8 May 2017 08:26:23 -0700	[thread overview]
Message-ID: <CAGXu5jL61K0bRSEg9a_LswNyrt3K1J57REbWVcvAXT54zWwtMA@mail.gmail.com> (raw)
In-Reply-To: <1494256932.1167.1.camel@gmail.com>

On Mon, May 8, 2017 at 8:22 AM, Daniel Micay <danielmicay@gmail.com> wrote:
> On Mon, 2017-05-08 at 09:52 +0200, Ingo Molnar wrote:
>>
>> ... it's just not usable in that form for a regular maintenance flow.
>>
>> So what would be more useful is to add a specific Sparse check that
>> only checks
>> KERNEL_DS, to add it as a regular (.config driven) build option and
>> make sure the
>> kernel build has zero warnings.
>>
>> From that point on we can declare that this kind of bug won't occur
>> anymore, if
>> the Sparse implementation of the check is correct.
>>
>> But there's a (big) problem with that development model: Sparse is not
>> part of the
>> kernel tree and adding a feature to it while making the kernel depend
>> on that
>> brand new feature is a logistical nightmare. The overhead is quite
>> similar to
>> adding new features to a compiler - it happens at a glacial pace and
>> is only done
>> for major features really, at considerable expense. I don't think this
>> is an
>> adequate model for 'extended syntax checking' of the kernel,
>> especially when it
>> comes to correctness that has such obvious security impact.
>>
>> Thanks,
>>
>>       Ingo
>
> There's the option of using GCC plugins now that the infrastructure was
> upstreamed from grsecurity. It can be used as part of the regular build
> process and as long as the analysis is pretty simple it shouldn't hurt
> compile time much.

Well, and that the situation may arise due to memory corruption, not
from poorly-matched set_fs() calls, which static analysis won't help
solve. We need to catch this bad kernel state because it is a very bad
state to run in.

-Kees

-- 
Kees Cook
Pixel Security

WARNING: multiple messages have this Message-ID (diff)
From: keescook@chromium.org (Kees Cook)
To: linux-arm-kernel@lists.infradead.org
Subject: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Mon, 8 May 2017 08:26:23 -0700	[thread overview]
Message-ID: <CAGXu5jL61K0bRSEg9a_LswNyrt3K1J57REbWVcvAXT54zWwtMA@mail.gmail.com> (raw)
In-Reply-To: <1494256932.1167.1.camel@gmail.com>

On Mon, May 8, 2017 at 8:22 AM, Daniel Micay <danielmicay@gmail.com> wrote:
> On Mon, 2017-05-08 at 09:52 +0200, Ingo Molnar wrote:
>>
>> ... it's just not usable in that form for a regular maintenance flow.
>>
>> So what would be more useful is to add a specific Sparse check that
>> only checks
>> KERNEL_DS, to add it as a regular (.config driven) build option and
>> make sure the
>> kernel build has zero warnings.
>>
>> From that point on we can declare that this kind of bug won't occur
>> anymore, if
>> the Sparse implementation of the check is correct.
>>
>> But there's a (big) problem with that development model: Sparse is not
>> part of the
>> kernel tree and adding a feature to it while making the kernel depend
>> on that
>> brand new feature is a logistical nightmare. The overhead is quite
>> similar to
>> adding new features to a compiler - it happens at a glacial pace and
>> is only done
>> for major features really, at considerable expense. I don't think this
>> is an
>> adequate model for 'extended syntax checking' of the kernel,
>> especially when it
>> comes to correctness that has such obvious security impact.
>>
>> Thanks,
>>
>>       Ingo
>
> There's the option of using GCC plugins now that the infrastructure was
> upstreamed from grsecurity. It can be used as part of the regular build
> process and as long as the analysis is pretty simple it shouldn't hurt
> compile time much.

Well, and that the situation may arise due to memory corruption, not
from poorly-matched set_fs() calls, which static analysis won't help
solve. We need to catch this bad kernel state because it is a very bad
state to run in.

-Kees

-- 
Kees Cook
Pixel Security

  reply	other threads:[~2017-05-08 15:26 UTC|newest]

Thread overview: 282+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-04-28 15:32 [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 2/4] x86/syscalls: Optimize address limit check Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 3/4] arm/syscalls: " Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 4/4] arm64/syscalls: " Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-05-05 22:18 ` [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-05-05 22:18   ` Thomas Garnier
2017-05-05 22:18   ` Thomas Garnier
2017-05-05 22:18   ` [kernel-hardening] " Thomas Garnier
2017-05-08  7:33   ` Ingo Molnar
2017-05-08  7:33     ` Ingo Molnar
2017-05-08  7:33     ` Ingo Molnar
2017-05-08  7:33     ` [kernel-hardening] " Ingo Molnar
2017-05-08  7:52     ` Ingo Molnar
2017-05-08  7:52       ` [kernel-hardening] " Ingo Molnar
2017-05-08  7:52       ` Ingo Molnar
2017-05-08  7:52       ` Ingo Molnar
2017-05-08  7:52       ` [kernel-hardening] " Ingo Molnar
2017-05-08 15:22       ` Daniel Micay
2017-05-08 15:22         ` Daniel Micay
2017-05-08 15:22         ` Daniel Micay
2017-05-08 15:26         ` Kees Cook [this message]
2017-05-08 15:26           ` Kees Cook
2017-05-08 15:26           ` Kees Cook
2017-05-08 19:51           ` Thomas Garnier
2017-05-08 19:51             ` Thomas Garnier
2017-05-08 19:51             ` Thomas Garnier
2017-05-09  6:56           ` Ingo Molnar
2017-05-09  6:56             ` Ingo Molnar
2017-05-09  6:56             ` Ingo Molnar
2017-05-09 11:10             ` Greg KH
2017-05-09 11:10               ` Greg KH
2017-05-09 11:10               ` Greg KH
2017-05-09 14:29               ` Thomas Garnier
2017-05-09 14:29                 ` Thomas Garnier
2017-05-09 14:29                 ` Thomas Garnier
2017-05-11 23:17                 ` Thomas Garnier
2017-05-11 23:17                   ` Thomas Garnier
2017-05-11 23:17                   ` Thomas Garnier
2017-05-11 23:44                   ` Linus Torvalds
2017-05-11 23:44                     ` Linus Torvalds
2017-05-11 23:44                     ` Linus Torvalds
2017-05-12  5:28                     ` Martin Schwidefsky
2017-05-12  5:28                       ` Martin Schwidefsky
2017-05-12  5:28                       ` Martin Schwidefsky
2017-05-12  5:34                       ` Kees Cook
2017-05-12  5:34                         ` Kees Cook
2017-05-12  5:34                         ` Kees Cook
2017-05-12  5:54                         ` Martin Schwidefsky
2017-05-12  5:54                           ` Martin Schwidefsky
2017-05-12  5:54                           ` Martin Schwidefsky
2017-05-12 19:01                           ` Kees Cook
2017-05-12 19:01                             ` Kees Cook
2017-05-12 19:01                             ` Kees Cook
2017-05-12 19:08                             ` Russell King - ARM Linux
2017-05-12 19:08                               ` Russell King - ARM Linux
2017-05-12 19:08                               ` Russell King - ARM Linux
2017-05-12 19:08                             ` Linus Torvalds
2017-05-12 19:08                               ` Linus Torvalds
2017-05-12 19:08                               ` Linus Torvalds
2017-05-12 19:30                               ` Kees Cook
2017-05-12 19:30                                 ` Kees Cook
2017-05-12 19:30                                 ` Kees Cook
2017-05-12 20:21                                 ` Russell King - ARM Linux
2017-05-12 20:21                                   ` Russell King - ARM Linux
2017-05-12 20:21                                   ` Russell King - ARM Linux
2017-05-12 20:30                                   ` Peter Zijlstra
2017-05-12 20:30                                     ` Peter Zijlstra
2017-05-12 20:30                                     ` Peter Zijlstra
2017-05-12 20:45                                     ` Russell King - ARM Linux
2017-05-12 20:45                                       ` Russell King - ARM Linux
2017-05-12 20:45                                       ` Russell King - ARM Linux
2017-05-12 21:00                                       ` Kees Cook
2017-05-12 21:00                                         ` Kees Cook
2017-05-12 21:00                                         ` Kees Cook
2017-05-12 21:04                                         ` Kees Cook
2017-05-12 21:04                                           ` Kees Cook
2017-05-12 21:04                                           ` Kees Cook
2017-05-13  7:21                                     ` Christoph Hellwig
2017-05-13  7:21                                       ` Christoph Hellwig
2017-05-13  7:21                                       ` Christoph Hellwig
2017-05-12 21:06                                   ` Al Viro
2017-05-12 21:06                                     ` Al Viro
2017-05-12 21:06                                     ` Al Viro
2017-05-12 21:16                                     ` [kernel-hardening] " Daniel Micay
2017-05-12 21:16                                       ` Daniel Micay
2017-05-12 21:16                                       ` Daniel Micay
2017-05-12 21:17                                     ` Kees Cook
2017-05-12 21:17                                       ` Kees Cook
2017-05-12 21:17                                       ` Kees Cook
2017-05-12 21:23                                       ` Daniel Micay
2017-05-12 21:23                                         ` Daniel Micay
2017-05-12 21:23                                         ` Daniel Micay
2017-05-12 21:41                                       ` Al Viro
2017-05-12 21:41                                         ` Al Viro
2017-05-12 21:41                                         ` Al Viro
2017-05-12 21:47                                         ` Rik van Riel
2017-05-12 21:47                                           ` Rik van Riel
2017-05-12 21:47                                           ` Rik van Riel
2017-05-12 22:57                                           ` Al Viro
2017-05-12 22:57                                             ` Al Viro
2017-05-12 22:57                                             ` Al Viro
2017-05-12 21:50                                         ` Kees Cook
2017-05-12 21:50                                           ` Kees Cook
2017-05-12 21:50                                           ` Kees Cook
2017-05-12  6:57                         ` Ingo Molnar
2017-05-12  6:57                           ` Ingo Molnar
2017-05-12  6:57                           ` Ingo Molnar
2017-05-12  6:13                     ` Andy Lutomirski
2017-05-12  6:13                       ` Andy Lutomirski
2017-05-12  6:13                       ` Andy Lutomirski
2017-05-12  6:58                     ` Ingo Molnar
2017-05-12  6:58                       ` Ingo Molnar
2017-05-12  6:58                       ` Ingo Molnar
2017-05-12 17:05                       ` Thomas Garnier
2017-05-12 17:05                         ` Thomas Garnier
2017-05-12 17:05                         ` Thomas Garnier
2017-05-09 16:30             ` [kernel-hardening] " Kees Cook
2017-05-09 16:30               ` Kees Cook
2017-05-09 16:30               ` Kees Cook
2017-05-08 12:46     ` Greg KH
2017-05-08 12:46       ` Greg KH
2017-05-08 12:46       ` Greg KH
2017-05-09  6:45       ` Ingo Molnar
2017-05-09  6:45         ` Ingo Molnar
2017-05-09  6:45         ` Ingo Molnar
2017-05-09  8:56         ` Christoph Hellwig
2017-05-09  8:56           ` Christoph Hellwig
2017-05-09  8:56           ` Christoph Hellwig
2017-05-09 13:00           ` Andy Lutomirski
2017-05-09 13:00             ` Andy Lutomirski
2017-05-09 13:00             ` Andy Lutomirski
2017-05-09 13:02             ` [kernel-hardening] " Christoph Hellwig
2017-05-09 13:02               ` Christoph Hellwig
2017-05-09 13:02               ` Christoph Hellwig
2017-05-09 16:03               ` Christoph Hellwig
2017-05-09 16:03                 ` Christoph Hellwig
2017-05-09 16:03                 ` Christoph Hellwig
2017-05-09 16:50                 ` Kees Cook
2017-05-09 16:50                   ` Kees Cook
2017-05-09 16:50                   ` Kees Cook
2017-05-09 22:52                   ` Andy Lutomirski
2017-05-09 22:52                     ` Andy Lutomirski
2017-05-09 22:52                     ` Andy Lutomirski
2017-05-09 23:31                     ` Kees Cook
2017-05-09 23:31                       ` Kees Cook
2017-05-09 23:31                       ` Kees Cook
2017-05-10  1:59                       ` Andy Lutomirski
2017-05-10  1:59                         ` Andy Lutomirski
2017-05-10  1:59                         ` Andy Lutomirski
2017-05-10  7:15                       ` Christoph Hellwig
2017-05-10  7:15                         ` Christoph Hellwig
2017-05-10  7:15                         ` Christoph Hellwig
2017-05-11 11:22                       ` Borislav Petkov
2017-05-11 11:22                         ` Borislav Petkov
2017-05-11 11:22                         ` Borislav Petkov
2017-05-10  6:46                   ` Christoph Hellwig
2017-05-10  6:46                     ` Christoph Hellwig
2017-05-10  6:46                     ` Christoph Hellwig
2017-05-10  2:11                 ` Al Viro
2017-05-10  2:11                   ` Al Viro
2017-05-10  2:11                   ` Al Viro
2017-05-10  2:45                   ` Al Viro
2017-05-10  2:45                     ` Al Viro
2017-05-10  2:45                     ` Al Viro
2017-05-10  3:12                     ` Al Viro
2017-05-10  3:12                       ` Al Viro
2017-05-10  3:12                       ` Al Viro
2017-05-10  3:21                       ` Al Viro
2017-05-10  3:21                         ` Al Viro
2017-05-10  3:21                         ` Al Viro
2017-05-10  3:39                         ` Al Viro
2017-05-10  3:39                           ` Al Viro
2017-05-10  3:39                           ` Al Viro
2017-05-10  6:54                           ` Christoph Hellwig
2017-05-10  6:54                             ` Christoph Hellwig
2017-05-10  6:54                             ` Christoph Hellwig
2017-05-10  6:53                       ` Christoph Hellwig
2017-05-10  6:53                         ` Christoph Hellwig
2017-05-10  6:53                         ` Christoph Hellwig
2017-05-10  7:27                         ` Al Viro
2017-05-10  7:27                           ` Al Viro
2017-05-10  7:27                           ` Al Viro
2017-05-10  7:35                           ` Christoph Hellwig
2017-05-10  7:35                             ` Christoph Hellwig
2017-05-10  7:35                             ` Christoph Hellwig
2017-05-10  6:49                     ` Christoph Hellwig
2017-05-10  6:49                       ` Christoph Hellwig
2017-05-10  6:49                       ` Christoph Hellwig
2017-05-10  7:28                 ` Arnd Bergmann
2017-05-10  7:28                   ` Arnd Bergmann
2017-05-10  7:28                   ` Arnd Bergmann
2017-05-10  7:35                   ` Christoph Hellwig
2017-05-10  7:35                     ` Christoph Hellwig
2017-05-10  7:35                     ` Christoph Hellwig
2017-05-09 16:05             ` Brian Gerst
2017-05-09 16:05               ` Brian Gerst
2017-05-09 16:05               ` Brian Gerst
2017-05-10  7:37             ` [kernel-hardening] " Arnd Bergmann
2017-05-10  7:37               ` Arnd Bergmann
2017-05-10  7:37               ` Arnd Bergmann
2017-05-10  8:08               ` Al Viro
2017-05-10  8:08                 ` Al Viro
2017-05-10  8:08                 ` Al Viro
2017-05-10  8:14                 ` Christoph Hellwig
2017-05-10  8:14                   ` Christoph Hellwig
2017-05-10  8:14                   ` Christoph Hellwig
2017-05-11  0:18                   ` Andy Lutomirski
2017-05-11  0:18                     ` Andy Lutomirski
2017-05-11  0:18                     ` Andy Lutomirski
2017-05-12  7:00             ` Ingo Molnar
2017-05-12  7:00               ` Ingo Molnar
2017-05-12  7:00               ` Ingo Molnar
2017-05-12  7:15               ` Al Viro
2017-05-12  7:15                 ` Al Viro
2017-05-12  7:15                 ` Al Viro
2017-05-12  7:35                 ` Christoph Hellwig
2017-05-12  7:35                   ` Christoph Hellwig
2017-05-12  7:35                   ` Christoph Hellwig
2017-05-12  8:07                   ` Christoph Hellwig
2017-05-12  8:07                     ` Christoph Hellwig
2017-05-12  8:07                     ` Christoph Hellwig
2017-05-12  8:23                     ` Greg KH
2017-05-12  8:23                       ` Greg KH
2017-05-12  8:23                       ` Greg KH
2017-05-12  7:43                 ` [kernel-hardening] " Arnd Bergmann
2017-05-12  7:43                   ` Arnd Bergmann
2017-05-12  7:43                   ` Arnd Bergmann
2017-05-12  8:11                   ` Christoph Hellwig
2017-05-12  8:11                     ` Christoph Hellwig
2017-05-12  8:11                     ` Christoph Hellwig
2017-05-12  8:16                     ` Al Viro
2017-05-12  8:16                       ` Al Viro
2017-05-12  8:16                       ` Al Viro
2017-05-12  8:11                   ` Al Viro
2017-05-12  8:11                     ` Al Viro
2017-05-12  8:11                     ` Al Viro
2017-05-12  8:20                     ` Arnd Bergmann
2017-05-12  8:20                       ` Arnd Bergmann
2017-05-12  8:20                       ` Arnd Bergmann
2017-05-12 23:20                 ` Andy Lutomirski
2017-05-12 23:20                   ` Andy Lutomirski
2017-05-12 23:20                   ` Andy Lutomirski
2017-05-08 13:09     ` Kees Cook
2017-05-08 13:09       ` Kees Cook
2017-05-08 13:09       ` Kees Cook
2017-05-08 13:09       ` [kernel-hardening] " Kees Cook
2017-05-08 14:02       ` Ingo Molnar
2017-05-08 14:02         ` Ingo Molnar
2017-05-08 14:02         ` Ingo Molnar
2017-05-08 14:02         ` [kernel-hardening] " Ingo Molnar
2017-05-08 14:06         ` Jann Horn
2017-05-08 14:06           ` Jann Horn
2017-05-08 14:06           ` Jann Horn
2017-05-08 14:06           ` [kernel-hardening] " Jann Horn
2017-05-08 20:48           ` Al Viro
2017-05-08 20:48             ` Al Viro
2017-05-08 20:48             ` Al Viro
2017-05-08 20:48             ` [kernel-hardening] " Al Viro
2017-05-12 23:15             ` Andy Lutomirski
2017-05-12 23:15               ` Andy Lutomirski
2017-05-12 23:15               ` Andy Lutomirski
2017-05-12 23:15               ` [kernel-hardening] " Andy Lutomirski
2017-05-08 15:24         ` Kees Cook
2017-05-08 15:24           ` Kees Cook
2017-05-08 15:24           ` Kees Cook
2017-05-08 15:24           ` [kernel-hardening] " Kees Cook
2017-05-09  6:34           ` Ingo Molnar
2017-05-09  6:34             ` Ingo Molnar
2017-05-09  6:34             ` Ingo Molnar
2017-05-09  6:34             ` [kernel-hardening] " Ingo Molnar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAGXu5jL61K0bRSEg9a_LswNyrt3K1J57REbWVcvAXT54zWwtMA@mail.gmail.com \
    --to=keescook@chromium.org \
    --cc=a.p.zijlstra@chello.nl \
    --cc=akpm@linux-foundation.org \
    --cc=arnd@arndb.de \
    --cc=borntraeger@de.ibm.com \
    --cc=bp@alien8.de \
    --cc=brgerst@gmail.com \
    --cc=catalin.marinas@arm.com \
    --cc=danielmicay@gmail.com \
    --cc=dave.hansen@intel.com \
    --cc=dhowells@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=heiko.carstens@de.ibm.com \
    --cc=hpa@zytor.com \
    --cc=james.morse@arm.com \
    --cc=jpoimboe@redhat.com \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=linux-api@vger.kernel.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linux@armlinux.org.uk \
    --cc=luto@kernel.org \
    --cc=mail@renenyffenegger.ch \
    --cc=mark.rutland@arm.com \
    --cc=mingo@kernel.org \
    --cc=mingo@redhat.com \
    --cc=oleg@redhat.com \
    --cc=paulmck@linux.vnet.ibm.com \
    --cc=pbonzini@redhat.com \
    --cc=ptikhomirov@virtuozzo.com \
    --cc=riel@redhat.com \
    --cc=schwidefsky@de.ibm.com \
    --cc=tglx@linutronix.de \
    --cc=thgarnie@google.com \
    --cc=torvalds@linux-foundation.org \
    --cc=will.deacon@arm.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.