LWN: Comments on "Cook: Security things in Linux v4.13" https://lwn.net/Articles/733095/ This is a special feed containing comments posted to the individual LWN article titled "Cook: Security things in Linux v4.13". en-us Fri, 29 Aug 2025 17:36:37 +0000 Fri, 29 Aug 2025 17:36:37 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Cook: Security things in Linux v4.13 https://lwn.net/Articles/734688/ https://lwn.net/Articles/734688/ paulj <div class="FormattedComment"> If PaxTeam also refers to Brad, then I don't believe your statement is true. Brad Spengler /did/ try to upstream his work, for a good while. He got flamed to a crisp for it by Linus eventually, and repeatedly IIRC.<br> </div> Sun, 24 Sep 2017 12:45:10 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733403/ https://lwn.net/Articles/733403/ dirtyepic <div class="FormattedComment"> Several of the GCC hardening flags are enabled by default in Gentoo.<br> </div> Mon, 11 Sep 2017 18:45:22 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733313/ https://lwn.net/Articles/733313/ ledow <div class="FormattedComment"> PaXTeam have never showed the slightest inclination at working with the kernel team to include their work piecemeal, as is required.<br> <p> They have a superiority complex which leads them to believe everyone should just dump their megabytes of patches direct into the kernel without oversight, control or audit.<br> <p> So it's not really surprising that they were overlooked in preference to others.<br> <p> Don't forget - just because Google sponsor it doesn't mean that anyone will let it into the kernel no matter what state it's in. And if you're going to sink money on someone on a project intending to get stuff into the official kernel, then PaX basically has zero comparative experience compared to a lot of other people who could do the work.<br> </div> Sun, 10 Sep 2017 14:47:18 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733204/ https://lwn.net/Articles/733204/ thestinger <div class="FormattedComment"> <font class="QuotedText">&gt; I really hope this will be part of the compiler and work for all software (yet another warning :-P).</font><br> <p> For userspace, it's a libc feature that has existed for many years. No need to wait to have it outside the kernel.<br> <p> This new kernel implementation of FORTIFY_SOURCE is different than in glibc since it checks for read overflows in addition to write overflows while glibc only adds checks for writes. The kernel implementation doesn't yet offer an equivalent to _FORTIFY_SOURCE=2 (intra-object overflow checks) in glibc in Linux 4.13 but the option exists downstream and is being actively tested already. The kernel implementation also works with both GCC and Clang, while the glibc implementation only works with GCC. Bionic used to have an implementation that worked with both GCC and Clang, but they're dropping GCC support and moved to a superior mechanism only available to Clang.<br> </div> Fri, 08 Sep 2017 07:10:50 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733202/ https://lwn.net/Articles/733202/ ntnn <div class="FormattedComment"> You can use the hardened profile without using the hardened kernel.<br> </div> Fri, 08 Sep 2017 05:08:38 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733156/ https://lwn.net/Articles/733156/ Tara_Li <div class="FormattedComment"> I'll have to look into how to enable this for Gentoo at some point, so I can get the benefits.<br> </div> Thu, 07 Sep 2017 16:26:36 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733148/ https://lwn.net/Articles/733148/ flussence <div class="FormattedComment"> <font class="QuotedText">&gt;Perhaps Brad and company were not offered the same opportunity for the constant belittle and finger pointing at upstream? Or their childish name calling non-stop.</font><br> There's no perhaps about it. They conducted themselves as horribly as possible in public for 10+ years, then had the audacity to demand to be paid tribute from anyone with deep pockets who ever used their patches, throwing the rest of their users under the bus out of spite as if it'd accomplish anything. Nobody would want their organisation's name tainted with that kind of association.<br> </div> Thu, 07 Sep 2017 16:09:58 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733125/ https://lwn.net/Articles/733125/ SEJeff <div class="FormattedComment"> Perhaps Brad and company were not offered the same opportunity for the constant belittle and finger pointing at upstream? Or their childish name calling non-stop.<br> <p> Sure they write great code, but if only a select few users can use it, how good is what they're really doing? Comparatively, Kees and the KSP (Kernel Self Protection) project have been breaking up a lot of their ideas and getting them merged upstream, where they benefit the literally millions of Linux users, vs the few that use the grsec patched kernels. Additionally, some of the features in the KSP are independent of the grsecurity / PAX patchsets.<br> </div> Thu, 07 Sep 2017 13:50:10 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733124/ https://lwn.net/Articles/733124/ pabs <div class="FormattedComment"> <font class="QuotedText">&gt; I really hope this will be part of the compiler and work for all software</font><br> <p> GCC upstream doesn't enable the hardening flags by default, so you either have to be on a distro that forces them on by default, or passing hardening flags to every build. Some distros choose the latter option, which means non-distro binaries usually do not have hardening flags applied.<br> </div> Thu, 07 Sep 2017 13:14:04 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733122/ https://lwn.net/Articles/733122/ patrick_g <div class="FormattedComment"> <font class="QuotedText">&gt; I always wondered if they really wanted to improve the security</font><br> <p> To play the Devil's advocate, Kees is paid by Google to do this work. According to Brad and PaXTeam they were never offered the same opportunity.<br> </div> Thu, 07 Sep 2017 12:50:37 +0000 Cook: Security things in Linux v4.13 https://lwn.net/Articles/733115/ https://lwn.net/Articles/733115/ ovitters <div class="FormattedComment"> I'm quite pleased that all of these security improvements are being made. It's rather unfortunate the way that PAX handled things. I always wondered if they really wanted to improve the security especially due to their recent actions (keeping their patches private, trying to force customers not to share them, etc).<br> <p> <font class="QuotedText">&gt; When all the sizes are known at compile time, this can actually allow the compiler to fail the build instead of continuing with a proven overflow.</font><br> <p> I really hope this will be part of the compiler and work for all software (yet another warning :-P).<br> </div> Thu, 07 Sep 2017 12:41:44 +0000