|
Message-ID: <476DC76E7D1DF2438D32BFADF679FC563EAF4C9D@ORSMSX103.amr.corp.intel.com> Date: Wed, 4 Oct 2017 16:17:54 +0000 From: "Roberts, William C" <william.c.roberts@...el.com> To: Greg KH <gregkh@...uxfoundation.org>, "Tobin C. Harding" <me@...in.cc> CC: Petr Mladek <pmladek@...e.com>, Joe Perches <joe@...ches.com>, "Ian Campbell" <ijc@...lion.org.uk>, Sergey Senozhatsky <sergey.senozhatsky@...il.com>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Catalin Marinas <catalin.marinas@....com>, Will Deacon <will.deacon@....com>, Steven Rostedt <rostedt@...dmis.org>, Chris Fries <cfries@...gle.com>, Dave Weinstein <olorin@...gle.com> Subject: RE: [RFC V2 0/6] add more kernel pointer filter options > -----Original Message----- > From: Greg KH [mailto:gregkh@...uxfoundation.org] > Sent: Wednesday, October 4, 2017 1:59 AM > To: Tobin C. Harding <me@...in.cc> > Cc: Petr Mladek <pmladek@...e.com>; Joe Perches <joe@...ches.com>; Ian > Campbell <ijc@...lion.org.uk>; Sergey Senozhatsky > <sergey.senozhatsky@...il.com>; kernel-hardening@...ts.openwall.com; linux- > kernel@...r.kernel.org; Catalin Marinas <catalin.marinas@....com>; Will > Deacon <will.deacon@....com>; Steven Rostedt <rostedt@...dmis.org>; > Roberts, William C <william.c.roberts@...el.com>; Chris Fries > <cfries@...gle.com>; Dave Weinstein <olorin@...gle.com> > Subject: Re: [kernel-hardening] [RFC V2 0/6] add more kernel pointer filter > options > > On Sun, Oct 01, 2017 at 11:06:44AM +1100, Tobin C. Harding wrote: > > Version 2 of Greg's patch series with changes made as suggested by comments > to V1. > > > > Applies on top of Linus' current development tree > > > > a8c964eacb21288b2dbfa9d80cee5968a3b8fb21 > > > > V1 cover letter: > > > > Here's a short patch series from Chris Fries and Dave Weinstein that > > implements some new restrictions when printing out kernel pointers, as > > well as the ability to whitelist kernel pointers where needed. > > > > These patches are based on work from William Roberts, and also are > > inspired by grsecurity's %pP to specifically whitelist a kernel > > pointer, where it is always needed, like the last patch in the series > > shows, in the UIO drivers (UIO requires that you know the address, > > it's a hardware address, nothing wrong with seeing that...) > > > > I haven't done much to this patch series, only forward porting it from > > an older kernel release (4.4) and a few minor tweaks. [snip] > > Nice! Thanks for doing this work, looks great to me. Care to resend the next > version as a "real" one (i.e. no RFC)? It looks like the only gripe from others was on the debug output change, so I'd drop that change out of the series. Otherwise, LGTM. > > thanks, > > greg k-h
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.