From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-yw0-f198.google.com (mail-yw0-f198.google.com [209.85.161.198]) by kanga.kvack.org (Postfix) with ESMTP id 72D106B026E for ; Thu, 11 Jan 2018 12:14:50 -0500 (EST) Received: by mail-yw0-f198.google.com with SMTP id b186so1793397ywe.4 for ; Thu, 11 Jan 2018 09:14:50 -0800 (PST) Received: from imap.thunk.org (imap.thunk.org. [2600:3c02::f03c:91ff:fe96:be03]) by mx.google.com with ESMTPS id e4si3172312ybj.595.2018.01.11.09.14.49 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 11 Jan 2018 09:14:49 -0800 (PST) Date: Thu, 11 Jan 2018 12:01:19 -0500 From: Theodore Ts'o Subject: Re: [PATCH 13/38] ext4: Define usercopy region in ext4_inode_cache slab cache Message-ID: <20180111170119.GB19241@thunk.org> References: <1515636190-24061-1-git-send-email-keescook@chromium.org> <1515636190-24061-14-git-send-email-keescook@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1515636190-24061-14-git-send-email-keescook@chromium.org> Sender: owner-linux-mm@kvack.org List-ID: To: Kees Cook Cc: linux-kernel@vger.kernel.org, David Windsor , Andreas Dilger , linux-ext4@vger.kernel.org, Linus Torvalds , Alexander Viro , Andrew Morton , Andy Lutomirski , Christoph Hellwig , Christoph Lameter , "David S. Miller" , Laura Abbott , Mark Rutland , "Martin K. Petersen" , Paolo Bonzini , Christian Borntraeger , Christoffer Dall , Dave Kleikamp , Jan Kara , Luis de Bethencourt , Marc Zyngier , Rik van Riel , Matthew Garrett , linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, linux-mm@kvack.org, kernel-hardening@lists.openwall.com On Wed, Jan 10, 2018 at 06:02:45PM -0800, Kees Cook wrote: > The ext4 symlink pathnames, stored in struct ext4_inode_info.i_data > and therefore contained in the ext4_inode_cache slab cache, need > to be copied to/from userspace. Symlink operations to/from userspace aren't common or in the hot path, and when they are in i_data, limited to at most 60 bytes. Is it worth it to copy through a bounce buffer so as to disallow any usercopies into struct ext4_inode_info? - Ted -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org