|
Message-ID: <CAGXu5jLEKczJF1MD7nncK6WMLXt+rm7ieWQ_MmphA=m63mbcyQ@mail.gmail.com> Date: Wed, 8 Jun 2016 19:58:10 -0700 From: Kees Cook <keescook@...omium.org> To: Brad Spengler <spender@...ecurity.net> Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, PaX Team <pageexec@...email.hu>, Casey Schaufler <casey.schaufler@...el.com>, Rik van Riel <riel@...hat.com>, Christoph Lameter <cl@...ux.com>, Pekka Enberg <penberg@...nel.org>, David Rientjes <rientjes@...gle.com>, Joonsoo Kim <iamjoonsoo.kim@....com>, Andrew Morton <akpm@...ux-foundation.org> Subject: Re: [PATCH v2 1/4] mm: Hardened usercopy On Wed, Jun 8, 2016 at 5:47 PM, Brad Spengler <spender@...ecurity.net> wrote: >> diff --git a/mm/usercopy.c b/mm/usercopy.c >> new file mode 100644 >> index 000000000000..e09c33070759 >> --- /dev/null >> +++ b/mm/usercopy.c >> @@ -0,0 +1,177 @@ >> +/* >> + * This implements the various checks for CONFIG_HARDENED_USERCOPY*, >> + * which are designed to protect kernel memory from needless exposure >> + * and overwrite under many conditions. >> + */ > > As this is a new file being introduced which is (modulo some bikeshedding > and addition of a few comments) a direct copy+paste of our code and comments > in fs/exec.c, I would appreciate both a GPL notice (the same as exists for > KASAN, etc) and both the PaX Team and myself being listed as the copyright > owners. Sure thing! I'll include it in the next revision. Do you have specific text and/or date ranges you'd prefer me to use? Thanks, -Kees -- Kees Cook Chrome OS & Brillo Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.