Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Jul 2016 11:20:47 -0500 (CDT)
From: Christoph Lameter <>
To: Kees Cook <>
cc: Michael Ellerman <>, 
    "" <>, 
    Jan Kara <>, Catalin Marinas <>, 
    Will Deacon <>, Linux-MM <>, 
    sparclinux <>,, 
    Andrea Arcangeli <>, 
    linux-arch <>, "" <>, 
    Russell King <>, PaX Team <>, 
    Borislav Petkov <>, lin <>, 
    Mathias Krause <>, Fenghua Yu <>, 
    Rik van Riel <>, David Rientjes <>, 
    Tony Luck <>, Andy Lutomirski <>, 
    Joonsoo Kim <>, Dmitry Vyukov <>, 
    Laura Abbott <>, 
    Brad Spengler <>, 
    Ard Biesheuvel <>, 
    LKML <>, Pekka Enberg <>, 
    Case y Schauf ler <>, 
    Andrew Morton <>, 
    "" <>, 
    "David S. Miller" <>
Subject: Re: Re: [PATCH 9/9] mm: SLUB hardened usercopy

On Fri, 8 Jul 2016, Kees Cook wrote:

> Is check_valid_pointer() making sure the pointer is within the usable
> size? It seemed like it was checking that it was within the slub
> object (checks against s->size, wants it above base after moving
> pointer to include redzone, etc).

check_valid_pointer verifies that a pointer is pointing to the start of an
object. It is used to verify the internal points that SLUB used and
should not be modified to do anything different.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.