From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753363Ab3LMSOo (ORCPT ); Fri, 13 Dec 2013 13:14:44 -0500 Received: from mail-ve0-f172.google.com ([209.85.128.172]:40525 "EHLO mail-ve0-f172.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752489Ab3LMSOn (ORCPT ); Fri, 13 Dec 2013 13:14:43 -0500 MIME-Version: 1.0 In-Reply-To: References: <1386867152-24072-1-git-send-email-vegard.nossum@oracle.com> <20131212190659.GG13547@thunk.org> <20131213002523.GA20706@redhat.com> <20131213014220.GB11068@kroah.com> Date: Fri, 13 Dec 2013 10:14:42 -0800 X-Google-Sender-Auth: z9jers32mxgSKSjt5mDVT8BuXE8 Message-ID: Subject: Re: [PATCH 1/9] Known exploit detection From: Linus Torvalds To: Kees Cook Cc: Greg Kroah-Hartman , Dave Jones , "Theodore Ts'o" , vegard.nossum@oracle.com, LKML , Tommi Rantala , Ingo Molnar , "Eric W. Biederman" , Andy Lutomirski , Daniel Vetter , Alan Cox , Jason Wang , "David S. Miller" , Dan Carpenter , James Morris Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 13, 2013 at 9:58 AM, Kees Cook wrote: > > These locations tend to be very hard to reach accidentally Not necessarily. Don't get me wrong - I think that it's a good idea to at least have the option to complain about certain errors, and leave markers in the logs about things that look suspicious. But looking through the recent list of commits that explicitly mention a CVE, the only one I find where a syslog message would make sense is the HID validation ones. There, adding a warning about malicious HID devices sounds like a good idea. But a *lot* of the rest is just checking ranges or making sure we have proper string handling etc that just wouldn't be practical to check. So the error itself may be "hard to reach accidentally", but *checking* it would be so complex/painful that it would likely just introduce more room for bugs. So I think the "WARNING" thing is a good idea, but I think it is a good idea if it's used very judiciously. IOW, not for "random CVE" (because quite frankly, most of them seem to be utter shit), but for serious known issues. And for those issues *only*. If I start seeing patches adding warnings "just because there's a CVE", then I'm not in the least interested. But if there is some known root-kit or similar, then by all means.. Linus