Kernel-hardening archive on lore.kernel.org
 help / color / Atom feed
* Contributing to KSPP newbie
@ 2019-11-29  4:39 Kassad
  2019-11-29 11:29 ` Mark Rutland
  0 siblings, 1 reply; 7+ messages in thread
From: Kassad @ 2019-11-29  4:39 UTC (permalink / raw)
  To: kernel-hardening, keescook

[-- Attachment #1: Type: text/plain, Size: 282 bytes --]

Hey Kees,

I'm 3rd university student interested in learning more about the linux
kernel. I'm came across this subsystem, since it aligns with my interest in
security. Do you think as a newbie this task
https://github.com/KSPP/linux/issues/11 will be a good starting point?

Thanks

[-- Attachment #2: Type: text/html, Size: 425 bytes --]

<div dir="ltr"><div>Hey Kees,</div><div><br></div><div>I&#39;m 3rd university student interested in learning more about the linux kernel. I&#39;m came across this subsystem, since it aligns with my interest in security. Do you think as a newbie this task <a href="https://github.com/KSPP/linux/issues/11">https://github.com/KSPP/linux/issues/11</a> will be a good starting point?</div><div><br></div><div>Thanks</div></div>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-29  4:39 Contributing to KSPP newbie Kassad
@ 2019-11-29 11:29 ` Mark Rutland
  2019-11-29 17:32   ` Kassad
  2019-11-30 16:48   ` Kees Cook
  0 siblings, 2 replies; 7+ messages in thread
From: Mark Rutland @ 2019-11-29 11:29 UTC (permalink / raw)
  To: Kassad; +Cc: kernel-hardening, keescook

On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> Hey Kees,
> 
> I'm 3rd university student interested in learning more about the linux kernel.
> I'm came across this subsystem, since it aligns with my interest in security.
> Do you think as a newbie this task https://github.com/KSPP/linux/issues/11 will
> be a good starting point?

I think this specific task (Disable arm32 kuser helpers) has already
been done, and the ticket is stale.

On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don't need
to run on HW prior to ARMv6. See commit:

  f6f91b0d9fd971c6 ("ARM: allow kuser helpers to be removed from the vector page")

On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See
commit:

  1b3cf2c2a3f42b ("arm64: compat: Add KUSER_HELPERS config option")

Thanks,
Mark.

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-29 11:29 ` Mark Rutland
@ 2019-11-29 17:32   ` Kassad
  2019-11-30 17:11     ` Kees Cook
  2019-11-30 16:48   ` Kees Cook
  1 sibling, 1 reply; 7+ messages in thread
From: Kassad @ 2019-11-29 17:32 UTC (permalink / raw)
  To: Mark Rutland; +Cc: keescook, kernel-hardening

[-- Attachment #1: Type: text/plain, Size: 1078 bytes --]

This might be a bit to vague but is there any task that is beginner
friendly? I did have a look at todo list and most of them look quite
daunting.


On Fri, Nov 29, 2019 at 6:29 AM Mark Rutland <mark.rutland@arm.com> wrote:

> On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> > Hey Kees,
> >
> > I'm 3rd university student interested in learning more about the linux
> kernel.
> > I'm came across this subsystem, since it aligns with my interest in
> security.
> > Do you think as a newbie this task
> https://github.com/KSPP/linux/issues/11 will
> > be a good starting point?
>
> I think this specific task (Disable arm32 kuser helpers) has already
> been done, and the ticket is stale.
>
> On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don't need
> to run on HW prior to ARMv6. See commit:
>
>   f6f91b0d9fd971c6 ("ARM: allow kuser helpers to be removed from the
> vector page")
>
> On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See
> commit:
>
>   1b3cf2c2a3f42b ("arm64: compat: Add KUSER_HELPERS config option")
>
> Thanks,
> Mark.
>

[-- Attachment #2: Type: text/html, Size: 1570 bytes --]

<div><div dir="auto">This might be a bit to vague but is there any task that is beginner friendly? I did have a look at todo list and most of them look quite daunting.</div><br></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Nov 29, 2019 at 6:29 AM Mark Rutland &lt;<a href="mailto:mark.rutland@arm.com">mark.rutland@arm.com</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:<br>
&gt; Hey Kees,<br>
&gt; <br>
&gt; I&#39;m 3rd university student interested in learning more about the linux kernel.<br>
&gt; I&#39;m came across this subsystem, since it aligns with my interest in security.<br>
&gt; Do you think as a newbie this task <a href="https://github.com/KSPP/linux/issues/11" rel="noreferrer" target="_blank">https://github.com/KSPP/linux/issues/11</a> will<br>
&gt; be a good starting point?<br>
<br>
I think this specific task (Disable arm32 kuser helpers) has already<br>
been done, and the ticket is stale.<br>
<br>
On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don&#39;t need<br>
to run on HW prior to ARMv6. See commit:<br>
<br>
  f6f91b0d9fd971c6 (&quot;ARM: allow kuser helpers to be removed from the vector page&quot;)<br>
<br>
On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See<br>
commit:<br>
<br>
  1b3cf2c2a3f42b (&quot;arm64: compat: Add KUSER_HELPERS config option&quot;)<br>
<br>
Thanks,<br>
Mark.<br>
</blockquote></div></div>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-29 11:29 ` Mark Rutland
  2019-11-29 17:32   ` Kassad
@ 2019-11-30 16:48   ` Kees Cook
  2019-11-30 16:54     ` Kees Cook
  2019-12-02 10:47     ` Mark Rutland
  1 sibling, 2 replies; 7+ messages in thread
From: Kees Cook @ 2019-11-30 16:48 UTC (permalink / raw)
  To: Mark Rutland; +Cc: Kassad, kernel-hardening

On Fri, Nov 29, 2019 at 11:29:13AM +0000, Mark Rutland wrote:
> On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> > Hey Kees,
> > 
> > I'm 3rd university student interested in learning more about the linux kernel.
> > I'm came across this subsystem, since it aligns with my interest in security.
> > Do you think as a newbie this task https://github.com/KSPP/linux/issues/11 will
> > be a good starting point?
> 
> I think this specific task (Disable arm32 kuser helpers) has already
> been done, and the ticket is stale.

Oh, thank you! I entirely missed both of these commits. I've added
notes to the bug and closed it.

> 
> On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don't need
> to run on HW prior to ARMv6. See commit:
> 
>   f6f91b0d9fd971c6 ("ARM: allow kuser helpers to be removed from the vector page")
> 
> On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See
> commit:
> 
>   1b3cf2c2a3f42b ("arm64: compat: Add KUSER_HELPERS config option")

(Typo: a1b3cf2c2a3f42b)

-Kees

> 
> Thanks,
> Mark.

-- 
Kees Cook

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-30 16:48   ` Kees Cook
@ 2019-11-30 16:54     ` Kees Cook
  2019-12-02 10:47     ` Mark Rutland
  1 sibling, 0 replies; 7+ messages in thread
From: Kees Cook @ 2019-11-30 16:54 UTC (permalink / raw)
  To: Mark Rutland; +Cc: Kassad, kernel-hardening

On Sat, Nov 30, 2019 at 08:48:23AM -0800, Kees Cook wrote:
> On Fri, Nov 29, 2019 at 11:29:13AM +0000, Mark Rutland wrote:
> > On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> > > Hey Kees,
> > > 
> > > I'm 3rd university student interested in learning more about the linux kernel.
> > > I'm came across this subsystem, since it aligns with my interest in security.
> > > Do you think as a newbie this task https://github.com/KSPP/linux/issues/11 will
> > > be a good starting point?
> > 
> > I think this specific task (Disable arm32 kuser helpers) has already
> > been done, and the ticket is stale.
> 
> Oh, thank you! I entirely missed both of these commits. I've added
> notes to the bug and closed it.
> 
> > 
> > On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don't need
> > to run on HW prior to ARMv6. See commit:
> > 
> >   f6f91b0d9fd971c6 ("ARM: allow kuser helpers to be removed from the vector page")
> > 
> > On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See
> > commit:
> > 
> >   1b3cf2c2a3f42b ("arm64: compat: Add KUSER_HELPERS config option")
> 
> (Typo: a1b3cf2c2a3f42b)

Typo typo: af1b3cf2c2a3f42bbb680812ff1bbd715ac8af69

> 
> -Kees
> 
> > 
> > Thanks,
> > Mark.
> 
> -- 
> Kees Cook

-- 
Kees Cook

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-29 17:32   ` Kassad
@ 2019-11-30 17:11     ` Kees Cook
  0 siblings, 0 replies; 7+ messages in thread
From: Kees Cook @ 2019-11-30 17:11 UTC (permalink / raw)
  To: Kassad; +Cc: Mark Rutland, kernel-hardening

On Fri, Nov 29, 2019 at 12:32:17PM -0500, Kassad wrote:
> On Fri, Nov 29, 2019 at 6:29 AM Mark Rutland <mark.rutland@arm.com> wrote:
> > On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> > > Hey Kees,
> > >
> > > I'm 3rd university student interested in learning more about the linux kernel.
> > > I'm came across this subsystem, since it aligns with my interest in security.

Hi! Welcome to the list. :)

> > > Do you think as a newbie this task
> > https://github.com/KSPP/linux/issues/11 will
> > > be a good starting point?
> >
> > I think this specific task (Disable arm32 kuser helpers) has already
> > been done, and the ticket is stale.
>
> This might be a bit to vague but is there any task that is beginner
> friendly? I did have a look at todo list and most of them look quite
> daunting.

I tried marking some bugs with "good first issue", but it looks like
people are already chipping away at things:
https://github.com/KSPP/linux/issues?q=is%3Aopen+is%3Aissue+label%3A%22good+first+issue%22

I haven't checked on this thread of discussion recently:
https://lore.kernel.org/lkml/CANhBUQ3V2A-TBVizVh+eMLSi5Gzw5sMBY7C-0a8=-z15qyQ75w@mail.gmail.com/
There might be some work in there still to replace odd uses of
strncmp()?

-- 
Kees Cook

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Contributing to KSPP newbie
  2019-11-30 16:48   ` Kees Cook
  2019-11-30 16:54     ` Kees Cook
@ 2019-12-02 10:47     ` Mark Rutland
  1 sibling, 0 replies; 7+ messages in thread
From: Mark Rutland @ 2019-12-02 10:47 UTC (permalink / raw)
  To: Kees Cook; +Cc: Kassad, kernel-hardening

On Sat, Nov 30, 2019 at 08:48:23AM -0800, Kees Cook wrote:
> On Fri, Nov 29, 2019 at 11:29:13AM +0000, Mark Rutland wrote:
> > On Thu, Nov 28, 2019 at 11:39:11PM -0500, Kassad wrote:
> > > Hey Kees,
> > > 
> > > I'm 3rd university student interested in learning more about the linux kernel.
> > > I'm came across this subsystem, since it aligns with my interest in security.
> > > Do you think as a newbie this task https://github.com/KSPP/linux/issues/11 will
> > > be a good starting point?
> > 
> > I think this specific task (Disable arm32 kuser helpers) has already
> > been done, and the ticket is stale.
> 
> Oh, thank you! I entirely missed both of these commits. I've added
> notes to the bug and closed it.

Great!

> > On arm CONFIG_KUSER_HELPERS can be disabled on kernels that don't need
> > to run on HW prior to ARMv6. See commit:
> > 
> >   f6f91b0d9fd971c6 ("ARM: allow kuser helpers to be removed from the vector page")
> > 
> > On arm64, CONFIG_KUSER_HELPERS can be disabled on any kernel. See
> > commit:
> > 
> >   1b3cf2c2a3f42b ("arm64: compat: Add KUSER_HELPERS config option")
> 
> (Typo: a1b3cf2c2a3f42b)

I see you use vim. ;)

Mark.

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, back to index

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-11-29  4:39 Contributing to KSPP newbie Kassad
2019-11-29 11:29 ` Mark Rutland
2019-11-29 17:32   ` Kassad
2019-11-30 17:11     ` Kees Cook
2019-11-30 16:48   ` Kees Cook
2019-11-30 16:54     ` Kees Cook
2019-12-02 10:47     ` Mark Rutland

Kernel-hardening archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/kernel-hardening/0 kernel-hardening/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 kernel-hardening kernel-hardening/ https://lore.kernel.org/kernel-hardening \
		kernel-hardening@lists.openwall.com
	public-inbox-index kernel-hardening

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/com.openwall.lists.kernel-hardening


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git