The "rare write" mechanism
The "rare write" mechanism
Posted Jun 2, 2017 0:22 UTC (Fri) by PaXTeam (guest, #24616)Parent article: The "rare write" mechanism
can we please stop with these bullshit plagiarism based articles? most if not all of the code attributed to Kees in the article is basically mine (he said so himself in the very post you linked to), pointless renaming and introduced bugs aside.
Posted Jun 2, 2017 0:25 UTC (Fri)
by corbet (editor, #1)
[Link] (3 responses)
Posted Jun 2, 2017 1:08 UTC (Fri)
by PaXTeam (guest, #24616)
[Link] (2 responses)
you can't say you weren't warned. some specific examples of apparently wilfully misattributed authorship claims:
> Cook's implementation contains architecture-specific code that relies on CPU features on x86 and ARM that selectively
the x86 specific code is mine, not his.
> Cook noted that his code is inlined [...]
again, it's my code which he copied.
> Cook's newly introduced __wr_rare annotation[...]
it's my __read_only attribute.
> Cook gave a simple example of the usage of the single rare_write() call by converting a function in net/core/sock_diag.c from:
it's my code too.
> Cook's implementation of the rare write functions on x86 became the following:
it's all my code.
Posted Jun 2, 2017 7:02 UTC (Fri)
by itvirta (guest, #49997)
[Link] (1 responses)
I think there might be more appropriate forums for copyright infringement claims than comments on a news site.
Posted Jun 2, 2017 13:02 UTC (Fri)
by madscientist (subscriber, #16861)
[Link]
Posted Jun 2, 2017 1:39 UTC (Fri)
by jeff_marshall (subscriber, #49255)
[Link] (11 responses)
The article seems to point this out in a straightforward (to me) manner:
> Kees Cook proposed such a mechanism based on similar functionality that exists in the PaX/grsecurity patch set
What would you propose that the LWN editors do differently?
Posted Jun 2, 2017 10:09 UTC (Fri)
by ballombe (subscriber, #9523)
[Link] (10 responses)
Posted Jun 4, 2017 0:44 UTC (Sun)
by giraffedata (guest, #1954)
[Link] (9 responses)
If it's basically code copied with some renaming, and Cook said so in the talk as PaXTeam says, then "based on code in the PaX/grsecurity patch set" or "derived from code ..." would be less misleading, if not, "largely copied from ..."
Posted Jun 5, 2017 7:00 UTC (Mon)
by jospoortvliet (guest, #33164)
[Link] (8 responses)
Posted Jun 6, 2017 3:17 UTC (Tue)
by flussence (guest, #85566)
[Link] (7 responses)
Posted Jun 6, 2017 10:56 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (1 responses)
Posted Jun 6, 2017 17:32 UTC (Tue)
by likryol (guest, #115542)
[Link]
Posted Jun 6, 2017 11:05 UTC (Tue)
by minipli (guest, #69735)
[Link] (4 responses)
Posted Jun 6, 2017 11:21 UTC (Tue)
by tao (subscriber, #17563)
[Link] (1 responses)
I find it hard to say that it lacks proper attribution though.
Posted Jun 26, 2017 9:33 UTC (Mon)
by jospoortvliet (guest, #33164)
[Link]
Posted Jun 6, 2017 11:24 UTC (Tue)
by nix (subscriber, #2304)
[Link] (1 responses)
Posted Jun 6, 2017 18:53 UTC (Tue)
by minipli (guest, #69735)
[Link]
This is just a prime example that they don't understand what they're copying. How would such an approach gain Linux security in any sensible way? It's always the bloody details that count -- that little corner case that also needs to be taken care of to make a security feature complete. But so far KSPP has just copy-pasted PaX/grsec code without fully understanding the interconnections with other features and code changes. I'd say, they need to slow down and start reading the whole thing, trying to understand what they just read and repeat -- until no new "Ahhh!" moments appear any more. What happens now isn't much more than a grep 'n sed over the patch without understanding what those hunks really do -- what other changes they need the grep didn't catch.
Dear PaX Team:
The provenance of the code in question is clearly described in the article itself. It is, meanwhile, development work that is relevant to the kernel development community and worthy of coverage. No bullshit, no plagiarism. No stopping.
The "rare write" mechanism
The "rare write" mechanism
> enable and disable write access to areas of memory.
The "rare write" mechanism
The "rare write" mechanism
The "rare write" mechanism
The "rare write" mechanism
If the code is largely copied from the PaX/grsecurity patch set, saying that Cook proposed a mechanism based on functionality (or function) in that patch set is inadequate. That says to me original code that does something similar to what the PaX/grsecurity code does.
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
The relevant code from the PaX Patch for v4.9.24 looks astonishingly similar to Kees' proposal, no?
So, now, please tell me this is not just a poor rip-off with minor bikeshedding applied!?
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
allows HAVE_ARCH_RARE_WRITE to work on x86."
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution
The "rare write" mechanism - attribution