[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jKXtq75+HkziTT-8F0VHvvOiRrtfez60h8hKK1GaE64ug@mail.gmail.com>
Date: Fri, 29 Jun 2018 13:27:08 -0700
From: Kees Cook <keescook@...omium.org>
To: Kamal Mostafa <kamal@...onical.com>
Cc: LKML <linux-kernel@...r.kernel.org>,
James Morris <jmorris@...ei.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
"open list:SECURITY SUBSYSTEM"
<linux-security-module@...r.kernel.org>
Subject: Re: [PATCH] security: CONFIG_HARDENED_USERCOPY does not need to
select BUG
On Fri, Jun 29, 2018 at 1:04 PM, Kamal Mostafa <kamal@...onical.com> wrote:
> Allows for CONFIG_HARDENED_USERCOPY without CONFIG_BUG.
>
> Signed-off-by: Kamal Mostafa <kamal@...onical.com>
> ---
> security/Kconfig | 1 -
> 1 file changed, 1 deletion(-)
>
> diff --git a/security/Kconfig b/security/Kconfig
> index c430206..7667774 100644
> --- a/security/Kconfig
> +++ b/security/Kconfig
> @@ -153,7 +153,6 @@ config HAVE_HARDENED_USERCOPY_ALLOCATOR
> config HARDENED_USERCOPY
> bool "Harden memory copies between kernel and userspace"
> depends on HAVE_HARDENED_USERCOPY_ALLOCATOR
> - select BUG
> imply STRICT_DEVMEM
> help
> This option checks for obviously wrong memory regions when
Do the lkdtm tests for usercopy correctly halt the kernel thread if
CONFIG_BUG is removed?
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists