From: Al Viro <viro@ZenIV.linux.org.uk>
To: Rik van Riel <riel@redhat.com>
Cc: "Kees Cook" <keescook@chromium.org>,
"Russell King - ARM Linux" <linux@armlinux.org.uk>,
"Linus Torvalds" <torvalds@linux-foundation.org>,
"Mark Rutland" <mark.rutland@arm.com>,
"Kernel Hardening" <kernel-hardening@lists.openwall.com>,
"Greg KH" <greg@kroah.com>,
"Heiko Carstens" <heiko.carstens@de.ibm.com>,
LKML <linux-kernel@vger.kernel.org>,
"David Howells" <dhowells@redhat.com>,
"Dave Hansen" <dave.hansen@intel.com>,
"H . Peter Anvin" <hpa@zytor.com>,
"Ingo Molnar" <mingo@kernel.org>,
"Pavel Tikhomirov" <ptikhomirov@virtuozzo.com>,
linux-s390 <linux-s390@vger.kernel.org>,
"the arch/x86 maintainers" <x86@kernel.org>,
"Will Deacon" <will.deacon@arm.com>,
"Christian Borntraeger" <borntraeger@de.ibm.com>,
"René Nyffenegger" <mail@renenyffenegger.ch>,
"Catalin Marinas" <catalin.marinas@arm.com>,
"Paul E . McKenney" <paulmck@linux.vnet.ibm.com>,
"Peter Zijlstra" <a.p.zijlstra@chello.nl>,
"Arnd Bergmann" <arnd@arndb.de>,
"Brian Gerst" <brgerst@gmail.com>,
"Borislav Petkov" <bp@alien8.de>,
"Andy Lutomirski" <luto@kernel.org>,
"Josh Poimboeuf" <jpoimboe@redhat.com>,
"Thomas Gleixner" <tglx@linutronix.de>,
"Ingo Molnar" <mingo@redhat.com>,
"linux-arm-kernel@lists.infradead.org"
<linux-arm-kernel@lists.infradead.org>,
"Linux API" <linux-api@vger.kernel.org>,
"Oleg Nesterov" <oleg@redhat.com>,
"Daniel Micay" <danielmicay@gmail.com>,
"James Morse" <james.morse@arm.com>,
"Eric W . Biederman" <ebiederm@xmission.com>,
"Martin Schwidefsky" <schwidefsky@de.ibm.com>,
"Paolo Bonzini" <pbonzini@redhat.com>,
"Andrew Morton" <akpm@linux-foundation.org>,
"Thomas Garnier" <thgarnie@google.com>,
"Kirill A . Shutemov" <kirill.shutemov@linux.intel.com>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Fri, 12 May 2017 23:57:55 +0100 [thread overview]
Message-ID: <20170512225755.GU390@ZenIV.linux.org.uk> (raw)
In-Reply-To: <1494625675.29205.21.camel@redhat.com>
On Fri, May 12, 2017 at 05:47:55PM -0400, Rik van Riel wrote:
> > Seriously, look at these beasts. Overwriting ->addr_limit is nowhere
> > near
> > the top threat. If attacker can overwrite thread_info, you have
> > lost.
>
> That is why THREAD_INFO_IN_TASK exists. It moves
> the struct thread_info to a location away from the
> stack, which means a stack overflow will not overwrite
> the thread_info.
... in which case such attacks on ->addr_limit also become a non-issue.
AFAICS, we are mixing several unrelated issues here:
* amount of places where set_fs() is called. Sure, reducing it
is a good idea and we want to move to primitives like kernel_write() et.al.
Fewer users => lower odds of screwing it up.
* making sure that remaining callers are properly paired. Ditto.
* switching to ->read_iter()/->write_iter() where it makes sense.
Again, no problem with that.
* providing sane environment for places like perf/oprofile. Again,
a good idea, and set_fs(USER_DS) is only a part of what's needed there.
* switching _everything_ to ->read_iter()/->write_iter(). Flat-out
insane and AFAICS nobody is signing up for that.
* getting rid of set_fs() entirely. I'm afraid that it's not feasible
without the previous one and frankly, I don't see much point.
* sanity-checking on return to userland. Maybe useful, maybe not.
* taking thread_info out of the way of stack overflows. Reasonable,
but has very little to do with the rest of that.
* protecting against Lovecraftian horrors slithering in from the outer
space only to commit unspeakable acts against ->addr_limit and ignoring much
tastier targets next to it, but then what do you expect from degenerate
spawn of Great Old Ones - sanity?
WARNING: multiple messages have this Message-ID (diff)
From: Al Viro <viro-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
To: Rik van Riel <riel-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
Cc: "Kees Cook" <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>,
"Russell King - ARM Linux"
<linux-I+IVW8TIWO2tmTQ+vhA3Yw@public.gmane.org>,
"Linus Torvalds"
<torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>,
"Mark Rutland" <mark.rutland-5wv7dgnIgG8@public.gmane.org>,
"Kernel Hardening"
<kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org>,
"Greg KH" <greg-U8xfFu+wG4EAvxtiuMwx3w@public.gmane.org>,
"Heiko Carstens"
<heiko.carstens-tA70FqPdS9bQT0dZR+AlfA@public.gmane.org>,
LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
"David Howells"
<dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>,
"Dave Hansen"
<dave.hansen-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>,
"H . Peter Anvin" <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org>,
"Ingo Molnar" <mingo-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>,
"Pavel Tikhomirov"
<ptikhomirov-5HdwGun5lf+gSpxsJD1C4w@public.gmane.org>,
linux-s390 <linux-s390-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
"the arch/x86 maintainers"
<x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>,
"Will Deacon" <will.deacon-5wv7dgnIgG8@public.gmane.org>,
"Christian Borntraeger"
<borntraeger-tA70FqPdS9bQT0dZR+AlfA@public.gmane.org>,
"René Nyffenegger"
<mail-gLCNRsNSrVdVZEhyV+6z5nIPMjoJpjVV@public.gmane.org>
Subject: Re: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Fri, 12 May 2017 23:57:55 +0100 [thread overview]
Message-ID: <20170512225755.GU390@ZenIV.linux.org.uk> (raw)
In-Reply-To: <1494625675.29205.21.camel-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
On Fri, May 12, 2017 at 05:47:55PM -0400, Rik van Riel wrote:
> > Seriously, look at these beasts. Overwriting ->addr_limit is nowhere
> > near
> > the top threat. If attacker can overwrite thread_info, you have
> > lost.
>
> That is why THREAD_INFO_IN_TASK exists. It moves
> the struct thread_info to a location away from the
> stack, which means a stack overflow will not overwrite
> the thread_info.
... in which case such attacks on ->addr_limit also become a non-issue.
AFAICS, we are mixing several unrelated issues here:
* amount of places where set_fs() is called. Sure, reducing it
is a good idea and we want to move to primitives like kernel_write() et.al.
Fewer users => lower odds of screwing it up.
* making sure that remaining callers are properly paired. Ditto.
* switching to ->read_iter()/->write_iter() where it makes sense.
Again, no problem with that.
* providing sane environment for places like perf/oprofile. Again,
a good idea, and set_fs(USER_DS) is only a part of what's needed there.
* switching _everything_ to ->read_iter()/->write_iter(). Flat-out
insane and AFAICS nobody is signing up for that.
* getting rid of set_fs() entirely. I'm afraid that it's not feasible
without the previous one and frankly, I don't see much point.
* sanity-checking on return to userland. Maybe useful, maybe not.
* taking thread_info out of the way of stack overflows. Reasonable,
but has very little to do with the rest of that.
* protecting against Lovecraftian horrors slithering in from the outer
space only to commit unspeakable acts against ->addr_limit and ignoring much
tastier targets next to it, but then what do you expect from degenerate
spawn of Great Old Ones - sanity?
WARNING: multiple messages have this Message-ID (diff)
From: viro@ZenIV.linux.org.uk (Al Viro)
To: linux-arm-kernel@lists.infradead.org
Subject: [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode
Date: Fri, 12 May 2017 23:57:55 +0100 [thread overview]
Message-ID: <20170512225755.GU390@ZenIV.linux.org.uk> (raw)
In-Reply-To: <1494625675.29205.21.camel@redhat.com>
On Fri, May 12, 2017 at 05:47:55PM -0400, Rik van Riel wrote:
> > Seriously, look at these beasts.??Overwriting ->addr_limit is nowhere
> > near
> > the top threat.??If attacker can overwrite thread_info, you have
> > lost.
>
> That is why THREAD_INFO_IN_TASK exists. It moves
> the struct thread_info to a location away from the
> stack, which means a stack overflow will not overwrite
> the thread_info.
... in which case such attacks on ->addr_limit also become a non-issue.
AFAICS, we are mixing several unrelated issues here:
* amount of places where set_fs() is called. Sure, reducing it
is a good idea and we want to move to primitives like kernel_write() et.al.
Fewer users => lower odds of screwing it up.
* making sure that remaining callers are properly paired. Ditto.
* switching to ->read_iter()/->write_iter() where it makes sense.
Again, no problem with that.
* providing sane environment for places like perf/oprofile. Again,
a good idea, and set_fs(USER_DS) is only a part of what's needed there.
* switching _everything_ to ->read_iter()/->write_iter(). Flat-out
insane and AFAICS nobody is signing up for that.
* getting rid of set_fs() entirely. I'm afraid that it's not feasible
without the previous one and frankly, I don't see much point.
* sanity-checking on return to userland. Maybe useful, maybe not.
* taking thread_info out of the way of stack overflows. Reasonable,
but has very little to do with the rest of that.
* protecting against Lovecraftian horrors slithering in from the outer
space only to commit unspeakable acts against ->addr_limit and ignoring much
tastier targets next to it, but then what do you expect from degenerate
spawn of Great Old Ones - sanity?
next prev parent reply other threads:[~2017-05-12 22:57 UTC|newest]
Thread overview: 282+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-04-28 15:32 [kernel-hardening] [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` [kernel-hardening] [PATCH v9 2/4] x86/syscalls: Optimize address limit check Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` [kernel-hardening] [PATCH v9 3/4] arm/syscalls: " Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` [kernel-hardening] [PATCH v9 4/4] arm64/syscalls: " Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-04-28 15:32 ` Thomas Garnier
2017-05-05 22:18 ` [kernel-hardening] Re: [PATCH v9 1/4] syscalls: Verify address limit before returning to user-mode Thomas Garnier
2017-05-05 22:18 ` Thomas Garnier
2017-05-05 22:18 ` Thomas Garnier
2017-05-05 22:18 ` Thomas Garnier
2017-05-08 7:33 ` [kernel-hardening] " Ingo Molnar
2017-05-08 7:33 ` Ingo Molnar
2017-05-08 7:33 ` Ingo Molnar
2017-05-08 7:33 ` Ingo Molnar
2017-05-08 7:52 ` [kernel-hardening] " Ingo Molnar
2017-05-08 7:52 ` Ingo Molnar
2017-05-08 7:52 ` Ingo Molnar
2017-05-08 7:52 ` [kernel-hardening] " Ingo Molnar
2017-05-08 7:52 ` Ingo Molnar
2017-05-08 15:22 ` [kernel-hardening] " Daniel Micay
2017-05-08 15:22 ` Daniel Micay
2017-05-08 15:22 ` Daniel Micay
2017-05-08 15:26 ` Kees Cook
2017-05-08 15:26 ` Kees Cook
2017-05-08 15:26 ` Kees Cook
2017-05-08 19:51 ` Thomas Garnier
2017-05-08 19:51 ` Thomas Garnier
2017-05-08 19:51 ` Thomas Garnier
2017-05-09 6:56 ` Ingo Molnar
2017-05-09 6:56 ` Ingo Molnar
2017-05-09 6:56 ` Ingo Molnar
2017-05-09 11:10 ` Greg KH
2017-05-09 11:10 ` Greg KH
2017-05-09 11:10 ` Greg KH
2017-05-09 14:29 ` Thomas Garnier
2017-05-09 14:29 ` Thomas Garnier
2017-05-09 14:29 ` Thomas Garnier
2017-05-11 23:17 ` Thomas Garnier
2017-05-11 23:17 ` Thomas Garnier
2017-05-11 23:17 ` Thomas Garnier
2017-05-11 23:44 ` Linus Torvalds
2017-05-11 23:44 ` Linus Torvalds
2017-05-11 23:44 ` Linus Torvalds
2017-05-12 5:28 ` Martin Schwidefsky
2017-05-12 5:28 ` Martin Schwidefsky
2017-05-12 5:28 ` Martin Schwidefsky
2017-05-12 5:34 ` Kees Cook
2017-05-12 5:34 ` Kees Cook
2017-05-12 5:34 ` Kees Cook
2017-05-12 5:54 ` Martin Schwidefsky
2017-05-12 5:54 ` Martin Schwidefsky
2017-05-12 5:54 ` Martin Schwidefsky
2017-05-12 19:01 ` Kees Cook
2017-05-12 19:01 ` Kees Cook
2017-05-12 19:01 ` Kees Cook
2017-05-12 19:08 ` Russell King - ARM Linux
2017-05-12 19:08 ` Russell King - ARM Linux
2017-05-12 19:08 ` Russell King - ARM Linux
2017-05-12 19:08 ` Linus Torvalds
2017-05-12 19:08 ` Linus Torvalds
2017-05-12 19:08 ` Linus Torvalds
2017-05-12 19:30 ` Kees Cook
2017-05-12 19:30 ` Kees Cook
2017-05-12 19:30 ` Kees Cook
2017-05-12 20:21 ` Russell King - ARM Linux
2017-05-12 20:21 ` Russell King - ARM Linux
2017-05-12 20:21 ` Russell King - ARM Linux
2017-05-12 20:30 ` Peter Zijlstra
2017-05-12 20:30 ` Peter Zijlstra
2017-05-12 20:30 ` Peter Zijlstra
2017-05-12 20:45 ` Russell King - ARM Linux
2017-05-12 20:45 ` Russell King - ARM Linux
2017-05-12 20:45 ` Russell King - ARM Linux
2017-05-12 21:00 ` Kees Cook
2017-05-12 21:00 ` Kees Cook
2017-05-12 21:00 ` Kees Cook
2017-05-12 21:04 ` Kees Cook
2017-05-12 21:04 ` Kees Cook
2017-05-12 21:04 ` Kees Cook
2017-05-13 7:21 ` Christoph Hellwig
2017-05-13 7:21 ` Christoph Hellwig
2017-05-13 7:21 ` Christoph Hellwig
2017-05-12 21:06 ` Al Viro
2017-05-12 21:06 ` Al Viro
2017-05-12 21:06 ` Al Viro
2017-05-12 21:16 ` [kernel-hardening] " Daniel Micay
2017-05-12 21:16 ` Daniel Micay
2017-05-12 21:16 ` Daniel Micay
2017-05-12 21:17 ` Kees Cook
2017-05-12 21:17 ` Kees Cook
2017-05-12 21:17 ` Kees Cook
2017-05-12 21:23 ` Daniel Micay
2017-05-12 21:23 ` Daniel Micay
2017-05-12 21:23 ` Daniel Micay
2017-05-12 21:41 ` Al Viro
2017-05-12 21:41 ` Al Viro
2017-05-12 21:41 ` Al Viro
2017-05-12 21:47 ` Rik van Riel
2017-05-12 21:47 ` Rik van Riel
2017-05-12 21:47 ` Rik van Riel
2017-05-12 22:57 ` Al Viro [this message]
2017-05-12 22:57 ` Al Viro
2017-05-12 22:57 ` Al Viro
2017-05-12 21:50 ` Kees Cook
2017-05-12 21:50 ` Kees Cook
2017-05-12 21:50 ` Kees Cook
2017-05-12 6:57 ` Ingo Molnar
2017-05-12 6:57 ` Ingo Molnar
2017-05-12 6:57 ` Ingo Molnar
2017-05-12 6:13 ` Andy Lutomirski
2017-05-12 6:13 ` Andy Lutomirski
2017-05-12 6:13 ` Andy Lutomirski
2017-05-12 6:58 ` Ingo Molnar
2017-05-12 6:58 ` Ingo Molnar
2017-05-12 6:58 ` Ingo Molnar
2017-05-12 17:05 ` Thomas Garnier
2017-05-12 17:05 ` Thomas Garnier
2017-05-12 17:05 ` Thomas Garnier
2017-05-09 16:30 ` [kernel-hardening] " Kees Cook
2017-05-09 16:30 ` Kees Cook
2017-05-09 16:30 ` Kees Cook
2017-05-08 12:46 ` Greg KH
2017-05-08 12:46 ` Greg KH
2017-05-08 12:46 ` Greg KH
2017-05-09 6:45 ` Ingo Molnar
2017-05-09 6:45 ` Ingo Molnar
2017-05-09 6:45 ` Ingo Molnar
2017-05-09 8:56 ` Christoph Hellwig
2017-05-09 8:56 ` Christoph Hellwig
2017-05-09 8:56 ` Christoph Hellwig
2017-05-09 13:00 ` Andy Lutomirski
2017-05-09 13:00 ` Andy Lutomirski
2017-05-09 13:00 ` Andy Lutomirski
2017-05-09 13:02 ` [kernel-hardening] " Christoph Hellwig
2017-05-09 13:02 ` Christoph Hellwig
2017-05-09 13:02 ` Christoph Hellwig
2017-05-09 16:03 ` Christoph Hellwig
2017-05-09 16:03 ` Christoph Hellwig
2017-05-09 16:03 ` Christoph Hellwig
2017-05-09 16:50 ` Kees Cook
2017-05-09 16:50 ` Kees Cook
2017-05-09 16:50 ` Kees Cook
2017-05-09 22:52 ` Andy Lutomirski
2017-05-09 22:52 ` Andy Lutomirski
2017-05-09 22:52 ` Andy Lutomirski
2017-05-09 23:31 ` Kees Cook
2017-05-09 23:31 ` Kees Cook
2017-05-09 23:31 ` Kees Cook
2017-05-10 1:59 ` Andy Lutomirski
2017-05-10 1:59 ` Andy Lutomirski
2017-05-10 1:59 ` Andy Lutomirski
2017-05-10 7:15 ` Christoph Hellwig
2017-05-10 7:15 ` Christoph Hellwig
2017-05-10 7:15 ` Christoph Hellwig
2017-05-11 11:22 ` Borislav Petkov
2017-05-11 11:22 ` Borislav Petkov
2017-05-11 11:22 ` Borislav Petkov
2017-05-10 6:46 ` Christoph Hellwig
2017-05-10 6:46 ` Christoph Hellwig
2017-05-10 6:46 ` Christoph Hellwig
2017-05-10 2:11 ` Al Viro
2017-05-10 2:11 ` Al Viro
2017-05-10 2:11 ` Al Viro
2017-05-10 2:45 ` Al Viro
2017-05-10 2:45 ` Al Viro
2017-05-10 2:45 ` Al Viro
2017-05-10 3:12 ` Al Viro
2017-05-10 3:12 ` Al Viro
2017-05-10 3:12 ` Al Viro
2017-05-10 3:21 ` Al Viro
2017-05-10 3:21 ` Al Viro
2017-05-10 3:21 ` Al Viro
2017-05-10 3:39 ` Al Viro
2017-05-10 3:39 ` Al Viro
2017-05-10 3:39 ` Al Viro
2017-05-10 6:54 ` Christoph Hellwig
2017-05-10 6:54 ` Christoph Hellwig
2017-05-10 6:54 ` Christoph Hellwig
2017-05-10 6:53 ` Christoph Hellwig
2017-05-10 6:53 ` Christoph Hellwig
2017-05-10 6:53 ` Christoph Hellwig
2017-05-10 7:27 ` Al Viro
2017-05-10 7:27 ` Al Viro
2017-05-10 7:27 ` Al Viro
2017-05-10 7:35 ` Christoph Hellwig
2017-05-10 7:35 ` Christoph Hellwig
2017-05-10 7:35 ` Christoph Hellwig
2017-05-10 6:49 ` Christoph Hellwig
2017-05-10 6:49 ` Christoph Hellwig
2017-05-10 6:49 ` Christoph Hellwig
2017-05-10 7:28 ` Arnd Bergmann
2017-05-10 7:28 ` Arnd Bergmann
2017-05-10 7:28 ` Arnd Bergmann
2017-05-10 7:35 ` Christoph Hellwig
2017-05-10 7:35 ` Christoph Hellwig
2017-05-10 7:35 ` Christoph Hellwig
2017-05-09 16:05 ` Brian Gerst
2017-05-09 16:05 ` Brian Gerst
2017-05-09 16:05 ` Brian Gerst
2017-05-10 7:37 ` [kernel-hardening] " Arnd Bergmann
2017-05-10 7:37 ` Arnd Bergmann
2017-05-10 7:37 ` Arnd Bergmann
2017-05-10 8:08 ` Al Viro
2017-05-10 8:08 ` Al Viro
2017-05-10 8:08 ` Al Viro
2017-05-10 8:14 ` Christoph Hellwig
2017-05-10 8:14 ` Christoph Hellwig
2017-05-10 8:14 ` Christoph Hellwig
2017-05-11 0:18 ` Andy Lutomirski
2017-05-11 0:18 ` Andy Lutomirski
2017-05-11 0:18 ` Andy Lutomirski
2017-05-12 7:00 ` Ingo Molnar
2017-05-12 7:00 ` Ingo Molnar
2017-05-12 7:00 ` Ingo Molnar
2017-05-12 7:15 ` Al Viro
2017-05-12 7:15 ` Al Viro
2017-05-12 7:15 ` Al Viro
2017-05-12 7:35 ` Christoph Hellwig
2017-05-12 7:35 ` Christoph Hellwig
2017-05-12 7:35 ` Christoph Hellwig
2017-05-12 8:07 ` Christoph Hellwig
2017-05-12 8:07 ` Christoph Hellwig
2017-05-12 8:07 ` Christoph Hellwig
2017-05-12 8:23 ` Greg KH
2017-05-12 8:23 ` Greg KH
2017-05-12 8:23 ` Greg KH
2017-05-12 7:43 ` [kernel-hardening] " Arnd Bergmann
2017-05-12 7:43 ` Arnd Bergmann
2017-05-12 7:43 ` Arnd Bergmann
2017-05-12 8:11 ` Christoph Hellwig
2017-05-12 8:11 ` Christoph Hellwig
2017-05-12 8:11 ` Christoph Hellwig
2017-05-12 8:16 ` Al Viro
2017-05-12 8:16 ` Al Viro
2017-05-12 8:16 ` Al Viro
2017-05-12 8:11 ` Al Viro
2017-05-12 8:11 ` Al Viro
2017-05-12 8:11 ` Al Viro
2017-05-12 8:20 ` Arnd Bergmann
2017-05-12 8:20 ` Arnd Bergmann
2017-05-12 8:20 ` Arnd Bergmann
2017-05-12 23:20 ` Andy Lutomirski
2017-05-12 23:20 ` Andy Lutomirski
2017-05-12 23:20 ` Andy Lutomirski
2017-05-08 13:09 ` Kees Cook
2017-05-08 13:09 ` Kees Cook
2017-05-08 13:09 ` Kees Cook
2017-05-08 13:09 ` Kees Cook
2017-05-08 14:02 ` [kernel-hardening] " Ingo Molnar
2017-05-08 14:02 ` Ingo Molnar
2017-05-08 14:02 ` Ingo Molnar
2017-05-08 14:02 ` Ingo Molnar
2017-05-08 14:06 ` [kernel-hardening] " Jann Horn
2017-05-08 14:06 ` Jann Horn
2017-05-08 14:06 ` Jann Horn
2017-05-08 14:06 ` Jann Horn
2017-05-08 20:48 ` [kernel-hardening] " Al Viro
2017-05-08 20:48 ` Al Viro
2017-05-08 20:48 ` Al Viro
2017-05-08 20:48 ` Al Viro
2017-05-12 23:15 ` [kernel-hardening] " Andy Lutomirski
2017-05-12 23:15 ` Andy Lutomirski
2017-05-12 23:15 ` Andy Lutomirski
2017-05-12 23:15 ` Andy Lutomirski
2017-05-08 15:24 ` [kernel-hardening] " Kees Cook
2017-05-08 15:24 ` Kees Cook
2017-05-08 15:24 ` Kees Cook
2017-05-08 15:24 ` Kees Cook
2017-05-09 6:34 ` [kernel-hardening] " Ingo Molnar
2017-05-09 6:34 ` Ingo Molnar
2017-05-09 6:34 ` Ingo Molnar
2017-05-09 6:34 ` Ingo Molnar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170512225755.GU390@ZenIV.linux.org.uk \
--to=viro@zeniv.linux.org.uk \
--cc=a.p.zijlstra@chello.nl \
--cc=akpm@linux-foundation.org \
--cc=arnd@arndb.de \
--cc=borntraeger@de.ibm.com \
--cc=bp@alien8.de \
--cc=brgerst@gmail.com \
--cc=catalin.marinas@arm.com \
--cc=danielmicay@gmail.com \
--cc=dave.hansen@intel.com \
--cc=dhowells@redhat.com \
--cc=ebiederm@xmission.com \
--cc=greg@kroah.com \
--cc=heiko.carstens@de.ibm.com \
--cc=hpa@zytor.com \
--cc=james.morse@arm.com \
--cc=jpoimboe@redhat.com \
--cc=keescook@chromium.org \
--cc=kernel-hardening@lists.openwall.com \
--cc=kirill.shutemov@linux.intel.com \
--cc=linux-api@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=linux@armlinux.org.uk \
--cc=luto@kernel.org \
--cc=mail@renenyffenegger.ch \
--cc=mark.rutland@arm.com \
--cc=mingo@kernel.org \
--cc=mingo@redhat.com \
--cc=oleg@redhat.com \
--cc=paulmck@linux.vnet.ibm.com \
--cc=pbonzini@redhat.com \
--cc=ptikhomirov@virtuozzo.com \
--cc=riel@redhat.com \
--cc=schwidefsky@de.ibm.com \
--cc=tglx@linutronix.de \
--cc=thgarnie@google.com \
--cc=torvalds@linux-foundation.org \
--cc=will.deacon@arm.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.