Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751901AbdGZAiO (ORCPT ); Tue, 25 Jul 2017 20:38:14 -0400 Received: from mail-it0-f45.google.com ([209.85.214.45]:35685 "EHLO mail-it0-f45.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751210AbdGZAiN (ORCPT ); Tue, 25 Jul 2017 20:38:13 -0400 MIME-Version: 1.0 In-Reply-To: References: <20170720014238.GH27396@yexl-desktop> From: Kees Cook Date: Tue, 25 Jul 2017 17:38:11 -0700 X-Google-Sender-Auth: rIJ-JcSCCMlquh5TNzo7g9qeQLQ Message-ID: Subject: Re: [lkp-robot] [include/linux/string.h] 6974f0c455: kernel_BUG_at_lib/string.c To: Linus Torvalds Cc: kernel test robot , Ananth N Mavinakayanahalli , Anil S Keshavamurthy , Masami Hiramatsu , Daniel Micay , Arnd Bergmann , Mark Rutland , Daniel Axtens , Rasmus Villemoes , Andy Shevchenko , Chris Metcalf , Thomas Gleixner , "H. Peter Anvin" , Ingo Molnar , Andrew Morton , LKML , LKP , Joe Perches Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1508 Lines: 42 On Tue, Jul 25, 2017 at 5:11 PM, Linus Torvalds wrote: > On Tue, Jul 25, 2017 at 4:35 PM, Kees Cook wrote: >> >> In this case, there isn't a sensible way to continue. > > Kees, stop this idiocy already. > > These have been FALSE POSITIVES. They haven't actually been bugs in > the code, they have been bugs in the *checking* code. > > In two years, when this code is actually trusted, that would be one thing. Okay, fair enough. As long as there is a time horizon where this can operate as an actual runtime protection, I can accept that. > But right now, it's a f*cking disgrace that you are in denial about > the fact that it's the *checking* that is broken, not the code, and > are making excuses for shit. I'm not in denial about that -- I think we just have very different perspectives on this. I sent a bunch of patches to fix all the places where there were false positives being found before this landed; I'm not making excuses and I'm obviously interested in fixing it. > So get rid of the BUG(), and get rid of the excuses. I'll get it fixed up. > We *know* this code is likely to find these kinds of "not really a > bug, but the checker code does something we didn't used to do" > situations. Yup, agreed. We've already fixed a bunch of these, and while this checking would catch some actual security vulnerabilities from the past, I can see your point about its "newness" being too great a risk. -Kees -- Kees Cook Pixel Security