lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 13 Aug 2018 13:33:16 -0700
From:   Kees Cook <keescook@...omium.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org,
        Chris von Recklinghausen <crecklin@...hat.com>,
        Kamal Mostafa <kamal@...onical.com>
Subject: [GIT PULL] hardened-usercopy updates for v4.19-rc1

Hi Linus,

Please pull these hardened-usercopy changes for v4.19-rc1. This cleans
up a minor Kconfig issue and adds a kernel boot option for disabling
hardened usercopy for distro users that may have corner-case performance
issues (e.g. high bandwidth small-packet UDP traffic).

Thanks!

-Kees

The following changes since commit 7daf201d7fe8334e2d2364d4e8ed3394ec9af819:

  Linux 4.18-rc2 (2018-06-24 20:54:29 +0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardened-usercopy-v4.19-rc1

for you to fetch changes up to b5cb15d9372abc9adc4e844c0c1bf594ca6a7695:

  usercopy: Allow boot cmdline disabling of hardening (2018-07-04 08:04:52 -0700)

----------------------------------------------------------------
- drop unneeded Kconfig "select BUG" (Kamal Mostafa)
- add "hardened_usercopy=off" rare performance needs (Chris von Recklinghausen)

----------------------------------------------------------------
Chris von Recklinghausen (1):
      usercopy: Allow boot cmdline disabling of hardening

Kamal Mostafa (1):
      usercopy: Do not select BUG with HARDENED_USERCOPY

 Documentation/admin-guide/kernel-parameters.txt | 11 +++++++++++
 include/linux/jump_label.h                      |  6 ++++++
 mm/usercopy.c                                   | 25 +++++++++++++++++++++++++
 security/Kconfig                                |  1 -
 4 files changed, 42 insertions(+), 1 deletion(-)

-- 
Kees Cook
Pixel Security

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ