From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753431AbcHQDhb (ORCPT ); Tue, 16 Aug 2016 23:37:31 -0400 Received: from mail-wm0-f50.google.com ([74.125.82.50]:35169 "EHLO mail-wm0-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751499AbcHQDh3 (ORCPT ); Tue, 16 Aug 2016 23:37:29 -0400 MIME-Version: 1.0 In-Reply-To: <20160817005509.GA6281@khazad-dum.debian.net> References: <1471393229-27182-1-git-send-email-keescook@chromium.org> <20160817005509.GA6281@khazad-dum.debian.net> From: Kees Cook Date: Tue, 16 Aug 2016 20:37:26 -0700 X-Google-Sender-Auth: deLVojh0vUj6Y-SL0Th4LDo1VeQ Message-ID: Subject: Re: [PATCH v2 0/5] bug: Provide toggle for BUG on data corruption To: Henrique de Moraes Holschuh Cc: "Paul E . McKenney" , Laura Abbott , Steven Rostedt , Stephen Boyd , Daniel Micay , Joe Perches , Arnd Bergmann , Greg Kroah-Hartman , Josh Triplett , Mathieu Desnoyers , Lai Jiangshan , "Aneesh Kumar K.V" , "Kirill A. Shutemov" , Michael Ellerman , Dan Williams , Andrew Morton , Ingo Molnar , Thomas Gleixner , Josef Bacik , Andrey Ryabinin , Tejun Heo , Nikolay Aleksandrov , Dmitry Vyukov , LKML , "kernel-hardening@lists.openwall.com" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 16, 2016 at 5:55 PM, Henrique de Moraes Holschuh wrote: > On Tue, 16 Aug 2016, Kees Cook wrote: >> This adds a CONFIG to trigger BUG()s when the kernel encounters >> unexpected data structure integrity as currently detected with >> CONFIG_DEBUG_LIST. >> >> Specifically list operations have been a target for widening flaws to gain >> "write anywhere" primitives for attackers, so this also consolidates the >> debug checking to avoid code and check duplication (e.g. RCU list debug >> was missing a check that got added to regular list debug). It also stops >> manipulations when corruption is detected, since worsening the corruption >> makes no sense. (Really, everyone should build with CONFIG_DEBUG_LIST >> since the checks are so inexpensive.) > > Well, maybe it wants a name that it looks like something that should be > enabled by default on production kernels? > > I.e. CONFIG_DETECT_LIST_CORRUPTION or somesuch? Yeah, that very well be true. I'd currently like to avoid CONFIG name churn, but I've added it to my list of CONFIGs to rename (along with CONFIG_DEBUG_RODATA). :) -Kees -- Kees Cook Nexus Security