linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* Re: [PATCH v6 0/5] Fortify strscpy()
       [not found] <20201119164915.10618-1-laniel_francis@privacyrequired.com>
@ 2020-11-20  1:35 ` Andrew Morton
  2020-11-20 13:33   ` David Laight
       [not found]   ` <5676804.6kI0aEeX2c@machine>
       [not found] ` <20201119164915.10618-2-laniel_francis@privacyrequired.com>
  1 sibling, 2 replies; 6+ messages in thread
From: Andrew Morton @ 2020-11-20  1:35 UTC (permalink / raw)
  To: laniel_francis; +Cc: linux-hardening, linux-mm, linux-kernel, dja, keescook

On Thu, 19 Nov 2020 17:49:10 +0100 laniel_francis@privacyrequired.com wrote:

> From: Francis Laniel <laniel_francis@privacyrequired.com>
> 
> Hi.
> 
> 
> I hope your families, friends and yourselves are fine.

Thanks.  You too ;)

> This patch set answers to this issue:
> https://github.com/KSPP/linux/issues/46

I fail to understand what this patchset has to do with that
one-element-array issue :(

> I based my modifications on top of two patches from Daniel Axtens which modify
> calls to __builtin_object_size to ensure the true size of char * are returned
> and not the surrounding structure size.
> 
> To sum up, in my first patch I implemented a fortified version of strscpy.
> This new version ensures the following before calling vanilla strscpy:
> 1. There is no read overflow because either size is smaller than src length
> or we shrink size to src length by calling fortified strnlen.
> 2. There is no write overflow because we either failed during compilation or at
> runtime by checking that size is smaller than dest size.
> The second patch brings a new file in LKDTM driver to test this new version.
> The test ensures the fortified version still returns the same value as the
> vanilla one while panic'ing when there is a write overflow.
> The third just corrects some typos in LKDTM related file.
> 
> If you see any problem or way to improve the code, feel free to share it.

Could you please send along a reworked [0/n] cover letter?  Explain in
your own words, without requiring that readers go off and read web
pages

- What problem the patchset solves
- How it solves it
- The value of the patchset (to kernel developers or to end-users) so that we
  can understand why it should be merged.

Thanks.



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v6 1/5] string.h: detect intra-object overflow in fortified string functions
       [not found] ` <20201119164915.10618-2-laniel_francis@privacyrequired.com>
@ 2020-11-20  1:38   ` Andrew Morton
  2020-11-20  9:41     ` Francis Laniel
  0 siblings, 1 reply; 6+ messages in thread
From: Andrew Morton @ 2020-11-20  1:38 UTC (permalink / raw)
  To: laniel_francis
  Cc: linux-hardening, linux-mm, linux-kernel, dja, keescook, Daniel Micay

On Thu, 19 Nov 2020 17:49:11 +0100 laniel_francis@privacyrequired.com wrote:

> From: Daniel Axtens <dja@axtens.net>
> 
> ...
> 
> Cc: Daniel Micay <danielmicay@gmail.com>
> Cc: Kees Cook <keescook@chromium.org>
> Reviewed-by: Kees Cook <keescook@chromium.org>
> Signed-off-by: Daniel Axtens <dja@axtens.net>

This patch should have your signoff as well, as per
Documentation/process/submitting-patches.rst "Developer's Certificate
of Origin 1.1".

I think it would be best to send out a v7 to address this and the cover
letter issue, please.



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v6 1/5] string.h: detect intra-object overflow in fortified string functions
  2020-11-20  1:38   ` [PATCH v6 1/5] string.h: detect intra-object overflow in fortified string functions Andrew Morton
@ 2020-11-20  9:41     ` Francis Laniel
  0 siblings, 0 replies; 6+ messages in thread
From: Francis Laniel @ 2020-11-20  9:41 UTC (permalink / raw)
  To: Andrew Morton
  Cc: linux-hardening, linux-mm, linux-kernel, dja, keescook, Daniel Micay

Le vendredi 20 novembre 2020, 02:38:22 CET Andrew Morton a écrit :
> On Thu, 19 Nov 2020 17:49:11 +0100 laniel_francis@privacyrequired.com wrote:
> > From: Daniel Axtens <dja@axtens.net>
> > 
> > ...
> > 
> > Cc: Daniel Micay <danielmicay@gmail.com>
> > Cc: Kees Cook <keescook@chromium.org>
> > Reviewed-by: Kees Cook <keescook@chromium.org>
> > Signed-off-by: Daniel Axtens <dja@axtens.net>
> 
> This patch should have your signoff as well, as per
> Documentation/process/submitting-patches.rst "Developer's Certificate
> of Origin 1.1".
> 
> I think it would be best to send out a v7 to address this and the cover
> letter issue, please.

Will be done for the v7!
I just read the documentation page, rebase on Linus Torvalds tree and send the 
v7!





^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: [PATCH v6 0/5] Fortify strscpy()
  2020-11-20  1:35 ` [PATCH v6 0/5] Fortify strscpy() Andrew Morton
@ 2020-11-20 13:33   ` David Laight
  2020-11-20 15:51     ` Francis Laniel
       [not found]   ` <5676804.6kI0aEeX2c@machine>
  1 sibling, 1 reply; 6+ messages in thread
From: David Laight @ 2020-11-20 13:33 UTC (permalink / raw)
  To: 'Andrew Morton', laniel_francis
  Cc: linux-hardening, linux-mm, linux-kernel, dja, keescook

From: Andrew Morton
> Sent: 20 November 2020 01:36
...
> Could you please send along a reworked [0/n] cover letter?  Explain in
> your own words, without requiring that readers go off and read web
> pages
> 
> - What problem the patchset solves
> - How it solves it
> - The value of the patchset (to kernel developers or to end-users) so that we
>   can understand why it should be merged.

- How much it slows things down.

	David

-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v6 0/5] Fortify strscpy()
  2020-11-20 13:33   ` David Laight
@ 2020-11-20 15:51     ` Francis Laniel
  0 siblings, 0 replies; 6+ messages in thread
From: Francis Laniel @ 2020-11-20 15:51 UTC (permalink / raw)
  To: David Laight
  Cc: 'Andrew Morton',
	linux-hardening, linux-mm, linux-kernel, dja, keescook

Le vendredi 20 novembre 2020, 14:33:53 CET David Laight a écrit :
> From: Andrew Morton
> 
> > Sent: 20 November 2020 01:36
> 
> ...
> 
> > Could you please send along a reworked [0/n] cover letter?  Explain in
> > your own words, without requiring that readers go off and read web
> > pages
> > 
> > - What problem the patchset solves
> > - How it solves it
> > - The value of the patchset (to kernel developers or to end-users) so that
> > we> 
> >   can understand why it should be merged.
> 
> - How much it slows things down.

I will add it for the next version!

> 	David
> 
> -
> Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1
> 1PT, UK Registration No: 1397386 (Wales)






^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v6 0/5] Fortify strscpy()
       [not found]   ` <5676804.6kI0aEeX2c@machine>
@ 2020-11-20 19:52     ` Kees Cook
  0 siblings, 0 replies; 6+ messages in thread
From: Kees Cook @ 2020-11-20 19:52 UTC (permalink / raw)
  To: Francis Laniel
  Cc: Andrew Morton, linux-hardening, linux-mm, linux-kernel, dja

On Fri, Nov 20, 2020 at 10:40:38AM +0100, Francis Laniel wrote:
> Le vendredi 20 novembre 2020, 02:35:43 CET Andrew Morton a écrit :
> > On Thu, 19 Nov 2020 17:49:10 +0100 laniel_francis@privacyrequired.com wrote:
> > > This patch set answers to this issue:
> > > https://github.com/KSPP/linux/issues/46
> > 
> > I fail to understand what this patchset has to do with that
> > one-element-array issue :(
>
> I think I linked another issue totally not related with that one...

This just looks like a typo. The URL should be:
https://github.com/KSPP/linux/issues/96

-- 
Kees Cook


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2020-11-20 19:52 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <20201119164915.10618-1-laniel_francis@privacyrequired.com>
2020-11-20  1:35 ` [PATCH v6 0/5] Fortify strscpy() Andrew Morton
2020-11-20 13:33   ` David Laight
2020-11-20 15:51     ` Francis Laniel
     [not found]   ` <5676804.6kI0aEeX2c@machine>
2020-11-20 19:52     ` Kees Cook
     [not found] ` <20201119164915.10618-2-laniel_francis@privacyrequired.com>
2020-11-20  1:38   ` [PATCH v6 1/5] string.h: detect intra-object overflow in fortified string functions Andrew Morton
2020-11-20  9:41     ` Francis Laniel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).