All of lore.kernel.org
 help / color / mirror / Atom feed
From: Thomas Garnier <thgarnie@google.com>
To: Greg KH <greg@kroah.com>
Cc: "Ingo Molnar" <mingo@kernel.org>,
	"Kees Cook" <keescook@chromium.org>,
	"Daniel Micay" <danielmicay@gmail.com>,
	"Martin Schwidefsky" <schwidefsky@de.ibm.com>,
	"Heiko Carstens" <heiko.carstens@de.ibm.com>,
	"Dave Hansen" <dave.hansen@intel.com>,
	"Arnd Bergmann" <arnd@arndb.de>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"David Howells" <dhowells@redhat.com>,
	"René Nyffenegger" <mail@renenyffenegger.ch>,
	"Andrew Morton" <akpm@linux-foundation.org>,
	"Paul E . McKenney" <paulmck@linux.vnet.ibm.com>,
	"Eric W . Biederman" <ebiederm@xmission.com>,
	"Oleg Nesterov" <oleg@redhat.com>,
	"Pavel Tikhomirov" <ptikhomirov@virtuozzo.com>,
	"Ingo Molnar" <mingo@redhat.com>,
	"H . Peter Anvin" <hpa@zytor.com>,
	"Andy Lutomirski" <luto@kernel.org>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	"Rik van Riel" <riel@redhat.com>,
	"Josh Poimboeuf" <jpoimboe@redhat.com>,
	"Borislav Petkov" <bp@alien8.de>,
	"Brian Gerst" <brgerst@gmail.com>,
	"Kirill A . Shutemov" <kirill.shutemov@linux.intel.com>,
	"Christian Borntraeger" <borntraeger@de.ibm.com>,
	"Russell King" <linux@armlinux.org.uk>,
	"Will Deacon" <will.deacon@arm.com>,
	"Catalin Marinas" <catalin.marinas@arm.com>,
	"Mark Rutland" <mark.rutland@arm.com>,
	"James Morse" <james.morse@arm.com>,
	linux-s390 <linux-s390@vger.kernel.org>,
	LKML <linux-kernel@vger.kernel.org>,
	"Linux API" <linux-api@vger.kernel.org>,
	"the arch/x86 maintainers" <x86@kernel.org>,
	"linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>,
	"Kernel Hardening" <kernel-hardening@lists.openwall.com>,
	"Linus Torvalds" <torvalds@linux-foundation.org>,
	"Peter Zijlstra" <a.p.zijlstra@chello.nl>,
	"Al Viro" <viro@zeniv.linux.org.uk>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Tue, 9 May 2017 07:29:57 -0700	[thread overview]
Message-ID: <CAJcbSZFswDWZoK-1UK+xkRMJ4ttSYbtH2Y5WD5_aPR-8ru6t8A@mail.gmail.com> (raw)
In-Reply-To: <20170509111007.GA14702@kroah.com>

On Tue, May 9, 2017 at 4:10 AM, Greg KH <greg@kroah.com> wrote:
> On Tue, May 09, 2017 at 08:56:19AM +0200, Ingo Molnar wrote:
>>
>> * Kees Cook <keescook@chromium.org> wrote:
>>
>> > > There's the option of using GCC plugins now that the infrastructure was
>> > > upstreamed from grsecurity. It can be used as part of the regular build
>> > > process and as long as the analysis is pretty simple it shouldn't hurt compile
>> > > time much.
>> >
>> > Well, and that the situation may arise due to memory corruption, not from
>> > poorly-matched set_fs() calls, which static analysis won't help solve. We need
>> > to catch this bad kernel state because it is a very bad state to run in.
>>
>> If memory corruption corrupted the task state into having addr_limit set to
>> KERNEL_DS then there's already a fair chance that it's game over: it could also
>> have set *uid to 0, or changed a sensitive PF_ flag, or a number of other
>> things...
>>
>> Furthermore, think about it: there's literally an infinite amount of corrupted
>> task states that could be a security problem and that could be checked after every
>> system call. Do we want to check every one of them?
>
> Ok, I'm all for not checking lots of stuff all the time, just to protect
> from crappy drivers that.  Especially as we _can_ audit and run checks
> on the source code for them in the kernel tree.
>
> But, and here's the problem, outside of the desktop/enterprise world,
> there are a ton of out-of-tree code that is crap.  The number of
> security/bug fixes and kernel crashes for out-of-tree code in systems
> like Android phones is just so high it's laughable.
>
> When you have a device that is running 3.2 million lines of kernel code,
> yet the diffstat of the tree compared to mainline adds 3 million lines
> of code, there is bound to be a ton of issues/problems there.
>
> So this is an entirely different thing we need to try to protect
> ourselves from.  A long time ago I laughed when I saw that Microsoft had
> to do lots of "hardening" of their kernel to protect themselves from
> crappy drivers, as I knew we didn't have to do that because we had the
> source for them and could fix the root issues.  But that has changed and
> now we don't all have that option.  That code is out-of-tree because the
> vendor doesn't care, and doesn't want to take any time at all to do
> anything resembling a real code review[1].

That's a big part of why I thought would be useful. I am less worried
about edge cases upstream right now than forks with custom codes not
using set_fs correctly.

>
> So, how about options like the ones being proposed here, go behind a new
> config option:
>         CONFIG_PROTECT_FROM_CRAPPY_DRIVERS
> that device owners can enable if they do not trust their vendor-provided
> code (hint, I sure don't.)  That way the "normal" path that all of us
> are used to running will be fine, but if you want to take the speed hit
> to try to protect yourself, then you can do that as well.

Maybe another name but why not.

>
> Anyway, just an idea...
>
> thanks,
>
> greg k-h
>
> [1] I am working really hard with lots of vendors to try to fix their
>     broken development model, but that is going to take years to resolve
>     as their device pipelines are years long, and changing their
>     mindsets takes a long time...



-- 
Thomas

WARNING: multiple messages have this Message-ID (diff)
From: Thomas Garnier <thgarnie-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
To: Greg KH <greg-U8xfFu+wG4EAvxtiuMwx3w@public.gmane.org>
Cc: "Ingo Molnar" <mingo-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>,
	"Kees Cook" <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>,
	"Daniel Micay"
	<danielmicay-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>,
	"Martin Schwidefsky"
	<schwidefsky-tA70FqPdS9bQT0dZR+AlfA@public.gmane.org>,
	"Heiko Carstens"
	<heiko.carstens-tA70FqPdS9bQT0dZR+AlfA@public.gmane.org>,
	"Dave Hansen"
	<dave.hansen-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>,
	"Arnd Bergmann" <arnd-r2nGTMty4D4@public.gmane.org>,
	"Thomas Gleixner" <tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org>,
	"David Howells"
	<dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>,
	"René Nyffenegger"
	<mail-gLCNRsNSrVdVZEhyV+6z5nIPMjoJpjVV@public.gmane.org>,
	"Andrew Morton"
	<akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>,
	"Paul E . McKenney"
	<paulmck-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>,
	"Eric W . Biederman"
	<ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>,
	"Oleg Nesterov" <oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>,
	"Pavel Tikhomirov"
	<ptikhomirov-5HdwGun5lf+gSpxsJD1C4w@public.gmane.org>,
	"Ingo Molnar" <mingo-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>,
	"H . Peter Anvin" <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org>,
	"Andy Lutomirski" <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>,
	"Paolo Bonzini"
	<pbonzini-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Tue, 9 May 2017 07:29:57 -0700	[thread overview]
Message-ID: <CAJcbSZFswDWZoK-1UK+xkRMJ4ttSYbtH2Y5WD5_aPR-8ru6t8A@mail.gmail.com> (raw)
In-Reply-To: <20170509111007.GA14702-U8xfFu+wG4EAvxtiuMwx3w@public.gmane.org>

On Tue, May 9, 2017 at 4:10 AM, Greg KH <greg-U8xfFu+wG4EAvxtiuMwx3w@public.gmane.org> wrote:
> On Tue, May 09, 2017 at 08:56:19AM +0200, Ingo Molnar wrote:
>>
>> * Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> wrote:
>>
>> > > There's the option of using GCC plugins now that the infrastructure was
>> > > upstreamed from grsecurity. It can be used as part of the regular build
>> > > process and as long as the analysis is pretty simple it shouldn't hurt compile
>> > > time much.
>> >
>> > Well, and that the situation may arise due to memory corruption, not from
>> > poorly-matched set_fs() calls, which static analysis won't help solve. We need
>> > to catch this bad kernel state because it is a very bad state to run in.
>>
>> If memory corruption corrupted the task state into having addr_limit set to
>> KERNEL_DS then there's already a fair chance that it's game over: it could also
>> have set *uid to 0, or changed a sensitive PF_ flag, or a number of other
>> things...
>>
>> Furthermore, think about it: there's literally an infinite amount of corrupted
>> task states that could be a security problem and that could be checked after every
>> system call. Do we want to check every one of them?
>
> Ok, I'm all for not checking lots of stuff all the time, just to protect
> from crappy drivers that.  Especially as we _can_ audit and run checks
> on the source code for them in the kernel tree.
>
> But, and here's the problem, outside of the desktop/enterprise world,
> there are a ton of out-of-tree code that is crap.  The number of
> security/bug fixes and kernel crashes for out-of-tree code in systems
> like Android phones is just so high it's laughable.
>
> When you have a device that is running 3.2 million lines of kernel code,
> yet the diffstat of the tree compared to mainline adds 3 million lines
> of code, there is bound to be a ton of issues/problems there.
>
> So this is an entirely different thing we need to try to protect
> ourselves from.  A long time ago I laughed when I saw that Microsoft had
> to do lots of "hardening" of their kernel to protect themselves from
> crappy drivers, as I knew we didn't have to do that because we had the
> source for them and could fix the root issues.  But that has changed and
> now we don't all have that option.  That code is out-of-tree because the
> vendor doesn't care, and doesn't want to take any time at all to do
> anything resembling a real code review[1].

That's a big part of why I thought would be useful. I am less worried
about edge cases upstream right now than forks with custom codes not
using set_fs correctly.

>
> So, how about options like the ones being proposed here, go behind a new
> config option:
>         CONFIG_PROTECT_FROM_CRAPPY_DRIVERS
> that device owners can enable if they do not trust their vendor-provided
> code (hint, I sure don't.)  That way the "normal" path that all of us
> are used to running will be fine, but if you want to take the speed hit
> to try to protect yourself, then you can do that as well.

Maybe another name but why not.

>
> Anyway, just an idea...
>
> thanks,
>
> greg k-h
>
> [1] I am working really hard with lots of vendors to try to fix their
>     broken development model, but that is going to take years to resolve
>     as their device pipelines are years long, and changing their
>     mindsets takes a long time...



-- 
Thomas

WARNING: multiple messages have this Message-ID (diff)
From: thgarnie@google.com (Thomas Garnier)
To: linux-arm-kernel@lists.infradead.org
Subject: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Tue, 9 May 2017 07:29:57 -0700	[thread overview]
Message-ID: <CAJcbSZFswDWZoK-1UK+xkRMJ4ttSYbtH2Y5WD5_aPR-8ru6t8A@mail.gmail.com> (raw)
In-Reply-To: <20170509111007.GA14702@kroah.com>

On Tue, May 9, 2017 at 4:10 AM, Greg KH <greg@kroah.com> wrote:
> On Tue, May 09, 2017 at 08:56:19AM +0200, Ingo Molnar wrote:
>>
>> * Kees Cook <keescook@chromium.org> wrote:
>>
>> > > There's the option of using GCC plugins now that the infrastructure was
>> > > upstreamed from grsecurity. It can be used as part of the regular build
>> > > process and as long as the analysis is pretty simple it shouldn't hurt compile
>> > > time much.
>> >
>> > Well, and that the situation may arise due to memory corruption, not from
>> > poorly-matched set_fs() calls, which static analysis won't help solve. We need
>> > to catch this bad kernel state because it is a very bad state to run in.
>>
>> If memory corruption corrupted the task state into having addr_limit set to
>> KERNEL_DS then there's already a fair chance that it's game over: it could also
>> have set *uid to 0, or changed a sensitive PF_ flag, or a number of other
>> things...
>>
>> Furthermore, think about it: there's literally an infinite amount of corrupted
>> task states that could be a security problem and that could be checked after every
>> system call. Do we want to check every one of them?
>
> Ok, I'm all for not checking lots of stuff all the time, just to protect
> from crappy drivers that.  Especially as we _can_ audit and run checks
> on the source code for them in the kernel tree.
>
> But, and here's the problem, outside of the desktop/enterprise world,
> there are a ton of out-of-tree code that is crap.  The number of
> security/bug fixes and kernel crashes for out-of-tree code in systems
> like Android phones is just so high it's laughable.
>
> When you have a device that is running 3.2 million lines of kernel code,
> yet the diffstat of the tree compared to mainline adds 3 million lines
> of code, there is bound to be a ton of issues/problems there.
>
> So this is an entirely different thing we need to try to protect
> ourselves from.  A long time ago I laughed when I saw that Microsoft had
> to do lots of "hardening" of their kernel to protect themselves from
> crappy drivers, as I knew we didn't have to do that because we had the
> source for them and could fix the root issues.  But that has changed and
> now we don't all have that option.  That code is out-of-tree because the
> vendor doesn't care, and doesn't want to take any time at all to do
> anything resembling a real code review[1].

That's a big part of why I thought would be useful. I am less worried
about edge cases upstream right now than forks with custom codes not
using set_fs correctly.

>
> So, how about options like the ones being proposed here, go behind a new
> config option:
>         CONFIG_PROTECT_FROM_CRAPPY_DRIVERS
> that device owners can enable if they do not trust their vendor-provided
> code (hint, I sure don't.)  That way the "normal" path that all of us
> are used to running will be fine, but if you want to take the speed hit
> to try to protect yourself, then you can do that as well.

Maybe another name but why not.

>
> Anyway, just an idea...
>
> thanks,
>
> greg k-h
>
> [1] I am working really hard with lots of vendors to try to fix their
>     broken development model, but that is going to take years to resolve
>     as their device pipelines are years long, and changing their
>     mindsets takes a long time...



-- 
Thomas

  reply	other threads:[~2017-05-09 14:30 UTC|newest]

Thread overview: 282+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-04-28 15:32 [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 2/4] x86/syscalls: Optimize address limit check Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 3/4] arm/syscalls: " Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-04-28 15:32 ` [PATCH v9 4/4] arm64/syscalls: " Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` Thomas Garnier
2017-04-28 15:32   ` [kernel-hardening] " Thomas Garnier
2017-05-05 22:18 ` [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-05-05 22:18   ` Thomas Garnier
2017-05-05 22:18   ` Thomas Garnier
2017-05-05 22:18   ` [kernel-hardening] " Thomas Garnier
2017-05-08  7:33   ` Ingo Molnar
2017-05-08  7:33     ` Ingo Molnar
2017-05-08  7:33     ` Ingo Molnar
2017-05-08  7:33     ` [kernel-hardening] " Ingo Molnar
2017-05-08  7:52     ` Ingo Molnar
2017-05-08  7:52       ` [kernel-hardening] " Ingo Molnar
2017-05-08  7:52       ` Ingo Molnar
2017-05-08  7:52       ` Ingo Molnar
2017-05-08  7:52       ` [kernel-hardening] " Ingo Molnar
2017-05-08 15:22       ` Daniel Micay
2017-05-08 15:22         ` Daniel Micay
2017-05-08 15:22         ` Daniel Micay
2017-05-08 15:26         ` Kees Cook
2017-05-08 15:26           ` Kees Cook
2017-05-08 15:26           ` Kees Cook
2017-05-08 19:51           ` Thomas Garnier
2017-05-08 19:51             ` Thomas Garnier
2017-05-08 19:51             ` Thomas Garnier
2017-05-09  6:56           ` Ingo Molnar
2017-05-09  6:56             ` Ingo Molnar
2017-05-09  6:56             ` Ingo Molnar
2017-05-09 11:10             ` Greg KH
2017-05-09 11:10               ` Greg KH
2017-05-09 11:10               ` Greg KH
2017-05-09 14:29               ` Thomas Garnier [this message]
2017-05-09 14:29                 ` Thomas Garnier
2017-05-09 14:29                 ` Thomas Garnier
2017-05-11 23:17                 ` Thomas Garnier
2017-05-11 23:17                   ` Thomas Garnier
2017-05-11 23:17                   ` Thomas Garnier
2017-05-11 23:44                   ` Linus Torvalds
2017-05-11 23:44                     ` Linus Torvalds
2017-05-11 23:44                     ` Linus Torvalds
2017-05-12  5:28                     ` Martin Schwidefsky
2017-05-12  5:28                       ` Martin Schwidefsky
2017-05-12  5:28                       ` Martin Schwidefsky
2017-05-12  5:34                       ` Kees Cook
2017-05-12  5:34                         ` Kees Cook
2017-05-12  5:34                         ` Kees Cook
2017-05-12  5:54                         ` Martin Schwidefsky
2017-05-12  5:54                           ` Martin Schwidefsky
2017-05-12  5:54                           ` Martin Schwidefsky
2017-05-12 19:01                           ` Kees Cook
2017-05-12 19:01                             ` Kees Cook
2017-05-12 19:01                             ` Kees Cook
2017-05-12 19:08                             ` Russell King - ARM Linux
2017-05-12 19:08                               ` Russell King - ARM Linux
2017-05-12 19:08                               ` Russell King - ARM Linux
2017-05-12 19:08                             ` Linus Torvalds
2017-05-12 19:08                               ` Linus Torvalds
2017-05-12 19:08                               ` Linus Torvalds
2017-05-12 19:30                               ` Kees Cook
2017-05-12 19:30                                 ` Kees Cook
2017-05-12 19:30                                 ` Kees Cook
2017-05-12 20:21                                 ` Russell King - ARM Linux
2017-05-12 20:21                                   ` Russell King - ARM Linux
2017-05-12 20:21                                   ` Russell King - ARM Linux
2017-05-12 20:30                                   ` Peter Zijlstra
2017-05-12 20:30                                     ` Peter Zijlstra
2017-05-12 20:30                                     ` Peter Zijlstra
2017-05-12 20:45                                     ` Russell King - ARM Linux
2017-05-12 20:45                                       ` Russell King - ARM Linux
2017-05-12 20:45                                       ` Russell King - ARM Linux
2017-05-12 21:00                                       ` Kees Cook
2017-05-12 21:00                                         ` Kees Cook
2017-05-12 21:00                                         ` Kees Cook
2017-05-12 21:04                                         ` Kees Cook
2017-05-12 21:04                                           ` Kees Cook
2017-05-12 21:04                                           ` Kees Cook
2017-05-13  7:21                                     ` Christoph Hellwig
2017-05-13  7:21                                       ` Christoph Hellwig
2017-05-13  7:21                                       ` Christoph Hellwig
2017-05-12 21:06                                   ` Al Viro
2017-05-12 21:06                                     ` Al Viro
2017-05-12 21:06                                     ` Al Viro
2017-05-12 21:16                                     ` [kernel-hardening] " Daniel Micay
2017-05-12 21:16                                       ` Daniel Micay
2017-05-12 21:16                                       ` Daniel Micay
2017-05-12 21:17                                     ` Kees Cook
2017-05-12 21:17                                       ` Kees Cook
2017-05-12 21:17                                       ` Kees Cook
2017-05-12 21:23                                       ` Daniel Micay
2017-05-12 21:23                                         ` Daniel Micay
2017-05-12 21:23                                         ` Daniel Micay
2017-05-12 21:41                                       ` Al Viro
2017-05-12 21:41                                         ` Al Viro
2017-05-12 21:41                                         ` Al Viro
2017-05-12 21:47                                         ` Rik van Riel
2017-05-12 21:47                                           ` Rik van Riel
2017-05-12 21:47                                           ` Rik van Riel
2017-05-12 22:57                                           ` Al Viro
2017-05-12 22:57                                             ` Al Viro
2017-05-12 22:57                                             ` Al Viro
2017-05-12 21:50                                         ` Kees Cook
2017-05-12 21:50                                           ` Kees Cook
2017-05-12 21:50                                           ` Kees Cook
2017-05-12  6:57                         ` Ingo Molnar
2017-05-12  6:57                           ` Ingo Molnar
2017-05-12  6:57                           ` Ingo Molnar
2017-05-12  6:13                     ` Andy Lutomirski
2017-05-12  6:13                       ` Andy Lutomirski
2017-05-12  6:13                       ` Andy Lutomirski
2017-05-12  6:58                     ` Ingo Molnar
2017-05-12  6:58                       ` Ingo Molnar
2017-05-12  6:58                       ` Ingo Molnar
2017-05-12 17:05                       ` Thomas Garnier
2017-05-12 17:05                         ` Thomas Garnier
2017-05-12 17:05                         ` Thomas Garnier
2017-05-09 16:30             ` [kernel-hardening] " Kees Cook
2017-05-09 16:30               ` Kees Cook
2017-05-09 16:30               ` Kees Cook
2017-05-08 12:46     ` Greg KH
2017-05-08 12:46       ` Greg KH
2017-05-08 12:46       ` Greg KH
2017-05-09  6:45       ` Ingo Molnar
2017-05-09  6:45         ` Ingo Molnar
2017-05-09  6:45         ` Ingo Molnar
2017-05-09  8:56         ` Christoph Hellwig
2017-05-09  8:56           ` Christoph Hellwig
2017-05-09  8:56           ` Christoph Hellwig
2017-05-09 13:00           ` Andy Lutomirski
2017-05-09 13:00             ` Andy Lutomirski
2017-05-09 13:00             ` Andy Lutomirski
2017-05-09 13:02             ` [kernel-hardening] " Christoph Hellwig
2017-05-09 13:02               ` Christoph Hellwig
2017-05-09 13:02               ` Christoph Hellwig
2017-05-09 16:03               ` Christoph Hellwig
2017-05-09 16:03                 ` Christoph Hellwig
2017-05-09 16:03                 ` Christoph Hellwig
2017-05-09 16:50                 ` Kees Cook
2017-05-09 16:50                   ` Kees Cook
2017-05-09 16:50                   ` Kees Cook
2017-05-09 22:52                   ` Andy Lutomirski
2017-05-09 22:52                     ` Andy Lutomirski
2017-05-09 22:52                     ` Andy Lutomirski
2017-05-09 23:31                     ` Kees Cook
2017-05-09 23:31                       ` Kees Cook
2017-05-09 23:31                       ` Kees Cook
2017-05-10  1:59                       ` Andy Lutomirski
2017-05-10  1:59                         ` Andy Lutomirski
2017-05-10  1:59                         ` Andy Lutomirski
2017-05-10  7:15                       ` Christoph Hellwig
2017-05-10  7:15                         ` Christoph Hellwig
2017-05-10  7:15                         ` Christoph Hellwig
2017-05-11 11:22                       ` Borislav Petkov
2017-05-11 11:22                         ` Borislav Petkov
2017-05-11 11:22                         ` Borislav Petkov
2017-05-10  6:46                   ` Christoph Hellwig
2017-05-10  6:46                     ` Christoph Hellwig
2017-05-10  6:46                     ` Christoph Hellwig
2017-05-10  2:11                 ` Al Viro
2017-05-10  2:11                   ` Al Viro
2017-05-10  2:11                   ` Al Viro
2017-05-10  2:45                   ` Al Viro
2017-05-10  2:45                     ` Al Viro
2017-05-10  2:45                     ` Al Viro
2017-05-10  3:12                     ` Al Viro
2017-05-10  3:12                       ` Al Viro
2017-05-10  3:12                       ` Al Viro
2017-05-10  3:21                       ` Al Viro
2017-05-10  3:21                         ` Al Viro
2017-05-10  3:21                         ` Al Viro
2017-05-10  3:39                         ` Al Viro
2017-05-10  3:39                           ` Al Viro
2017-05-10  3:39                           ` Al Viro
2017-05-10  6:54                           ` Christoph Hellwig
2017-05-10  6:54                             ` Christoph Hellwig
2017-05-10  6:54                             ` Christoph Hellwig
2017-05-10  6:53                       ` Christoph Hellwig
2017-05-10  6:53                         ` Christoph Hellwig
2017-05-10  6:53                         ` Christoph Hellwig
2017-05-10  7:27                         ` Al Viro
2017-05-10  7:27                           ` Al Viro
2017-05-10  7:27                           ` Al Viro
2017-05-10  7:35                           ` Christoph Hellwig
2017-05-10  7:35                             ` Christoph Hellwig
2017-05-10  7:35                             ` Christoph Hellwig
2017-05-10  6:49                     ` Christoph Hellwig
2017-05-10  6:49                       ` Christoph Hellwig
2017-05-10  6:49                       ` Christoph Hellwig
2017-05-10  7:28                 ` Arnd Bergmann
2017-05-10  7:28                   ` Arnd Bergmann
2017-05-10  7:28                   ` Arnd Bergmann
2017-05-10  7:35                   ` Christoph Hellwig
2017-05-10  7:35                     ` Christoph Hellwig
2017-05-10  7:35                     ` Christoph Hellwig
2017-05-09 16:05             ` Brian Gerst
2017-05-09 16:05               ` Brian Gerst
2017-05-09 16:05               ` Brian Gerst
2017-05-10  7:37             ` [kernel-hardening] " Arnd Bergmann
2017-05-10  7:37               ` Arnd Bergmann
2017-05-10  7:37               ` Arnd Bergmann
2017-05-10  8:08               ` Al Viro
2017-05-10  8:08                 ` Al Viro
2017-05-10  8:08                 ` Al Viro
2017-05-10  8:14                 ` Christoph Hellwig
2017-05-10  8:14                   ` Christoph Hellwig
2017-05-10  8:14                   ` Christoph Hellwig
2017-05-11  0:18                   ` Andy Lutomirski
2017-05-11  0:18                     ` Andy Lutomirski
2017-05-11  0:18                     ` Andy Lutomirski
2017-05-12  7:00             ` Ingo Molnar
2017-05-12  7:00               ` Ingo Molnar
2017-05-12  7:00               ` Ingo Molnar
2017-05-12  7:15               ` Al Viro
2017-05-12  7:15                 ` Al Viro
2017-05-12  7:15                 ` Al Viro
2017-05-12  7:35                 ` Christoph Hellwig
2017-05-12  7:35                   ` Christoph Hellwig
2017-05-12  7:35                   ` Christoph Hellwig
2017-05-12  8:07                   ` Christoph Hellwig
2017-05-12  8:07                     ` Christoph Hellwig
2017-05-12  8:07                     ` Christoph Hellwig
2017-05-12  8:23                     ` Greg KH
2017-05-12  8:23                       ` Greg KH
2017-05-12  8:23                       ` Greg KH
2017-05-12  7:43                 ` [kernel-hardening] " Arnd Bergmann
2017-05-12  7:43                   ` Arnd Bergmann
2017-05-12  7:43                   ` Arnd Bergmann
2017-05-12  8:11                   ` Christoph Hellwig
2017-05-12  8:11                     ` Christoph Hellwig
2017-05-12  8:11                     ` Christoph Hellwig
2017-05-12  8:16                     ` Al Viro
2017-05-12  8:16                       ` Al Viro
2017-05-12  8:16                       ` Al Viro
2017-05-12  8:11                   ` Al Viro
2017-05-12  8:11                     ` Al Viro
2017-05-12  8:11                     ` Al Viro
2017-05-12  8:20                     ` Arnd Bergmann
2017-05-12  8:20                       ` Arnd Bergmann
2017-05-12  8:20                       ` Arnd Bergmann
2017-05-12 23:20                 ` Andy Lutomirski
2017-05-12 23:20                   ` Andy Lutomirski
2017-05-12 23:20                   ` Andy Lutomirski
2017-05-08 13:09     ` Kees Cook
2017-05-08 13:09       ` Kees Cook
2017-05-08 13:09       ` Kees Cook
2017-05-08 13:09       ` [kernel-hardening] " Kees Cook
2017-05-08 14:02       ` Ingo Molnar
2017-05-08 14:02         ` Ingo Molnar
2017-05-08 14:02         ` Ingo Molnar
2017-05-08 14:02         ` [kernel-hardening] " Ingo Molnar
2017-05-08 14:06         ` Jann Horn
2017-05-08 14:06           ` Jann Horn
2017-05-08 14:06           ` Jann Horn
2017-05-08 14:06           ` [kernel-hardening] " Jann Horn
2017-05-08 20:48           ` Al Viro
2017-05-08 20:48             ` Al Viro
2017-05-08 20:48             ` Al Viro
2017-05-08 20:48             ` [kernel-hardening] " Al Viro
2017-05-12 23:15             ` Andy Lutomirski
2017-05-12 23:15               ` Andy Lutomirski
2017-05-12 23:15               ` Andy Lutomirski
2017-05-12 23:15               ` [kernel-hardening] " Andy Lutomirski
2017-05-08 15:24         ` Kees Cook
2017-05-08 15:24           ` Kees Cook
2017-05-08 15:24           ` Kees Cook
2017-05-08 15:24           ` [kernel-hardening] " Kees Cook
2017-05-09  6:34           ` Ingo Molnar
2017-05-09  6:34             ` Ingo Molnar
2017-05-09  6:34             ` Ingo Molnar
2017-05-09  6:34             ` [kernel-hardening] " Ingo Molnar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAJcbSZFswDWZoK-1UK+xkRMJ4ttSYbtH2Y5WD5_aPR-8ru6t8A@mail.gmail.com \
    --to=thgarnie@google.com \
    --cc=a.p.zijlstra@chello.nl \
    --cc=akpm@linux-foundation.org \
    --cc=arnd@arndb.de \
    --cc=borntraeger@de.ibm.com \
    --cc=bp@alien8.de \
    --cc=brgerst@gmail.com \
    --cc=catalin.marinas@arm.com \
    --cc=danielmicay@gmail.com \
    --cc=dave.hansen@intel.com \
    --cc=dhowells@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=greg@kroah.com \
    --cc=heiko.carstens@de.ibm.com \
    --cc=hpa@zytor.com \
    --cc=james.morse@arm.com \
    --cc=jpoimboe@redhat.com \
    --cc=keescook@chromium.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=linux-api@vger.kernel.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linux@armlinux.org.uk \
    --cc=luto@kernel.org \
    --cc=mail@renenyffenegger.ch \
    --cc=mark.rutland@arm.com \
    --cc=mingo@kernel.org \
    --cc=mingo@redhat.com \
    --cc=oleg@redhat.com \
    --cc=paulmck@linux.vnet.ibm.com \
    --cc=pbonzini@redhat.com \
    --cc=ptikhomirov@virtuozzo.com \
    --cc=riel@redhat.com \
    --cc=schwidefsky@de.ibm.com \
    --cc=tglx@linutronix.de \
    --cc=torvalds@linux-foundation.org \
    --cc=viro@zeniv.linux.org.uk \
    --cc=will.deacon@arm.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.