Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751140AbdFTEEH (ORCPT ); Tue, 20 Jun 2017 00:04:07 -0400 Received: from mail-pg0-f54.google.com ([74.125.83.54]:35612 "EHLO mail-pg0-f54.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750747AbdFTEEG (ORCPT ); Tue, 20 Jun 2017 00:04:06 -0400 Date: Mon, 19 Jun 2017 21:04:03 -0700 From: Eric Biggers To: Kees Cook Cc: kernel-hardening@lists.openwall.com, David Windsor , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [kernel-hardening] [PATCH 21/23] usercopy: Restrict non-usercopy caches to size 0 Message-ID: <20170620040403.GA610@zzz.localdomain> References: <1497915397-93805-1-git-send-email-keescook@chromium.org> <1497915397-93805-22-git-send-email-keescook@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1497915397-93805-22-git-send-email-keescook@chromium.org> User-Agent: Mutt/1.8.3 (2017-05-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 922 Lines: 19 Hi David + Kees, On Mon, Jun 19, 2017 at 04:36:35PM -0700, Kees Cook wrote: > With all known usercopied cache whitelists now defined in the kernel, switch > the default usercopy region of kmem_cache_create() to size 0. Any new caches > with usercopy regions will now need to use kmem_cache_create_usercopy() > instead of kmem_cache_create(). > While I'd certainly like to see the caches be whitelisted, it needs to be made very clear that it's being done (the cover letter for this series falsely claims that kmem_cache_create() is unchanged) and what the consequences are. Is there any specific plan for identifying caches that were missed? If it's expected for people to just fix them as they are found, then they need to be helped a little --- at the very least by putting a big comment above report_usercopy() that explains the possible reasons why the error might have triggered and what to do about it. - Eric