Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 16 Aug 2016 17:20:24 -0700
From: Kees Cook <>
To: "Paul E . McKenney" <>
Cc: Kees Cook <>,
	Laura Abbott <>,
	Steven Rostedt <>,
	Stephen Boyd <>,
	Daniel Micay <>,
	Joe Perches <>,
	Arnd Bergmann <>,
	Greg Kroah-Hartman <>,
	Josh Triplett <>,
	Mathieu Desnoyers <>,
	Lai Jiangshan <>,
	"Aneesh Kumar K.V" <>,
	"Kirill A. Shutemov" <>,
	Michael Ellerman <>,
	Dan Williams <>,
	Andrew Morton <>,
	Ingo Molnar <>,
	Thomas Gleixner <>,
	Josef Bacik <>,
	Andrey Ryabinin <>,
	Tejun Heo <>,
	Nikolay Aleksandrov <>,
	Dmitry Vyukov <>,,
Subject: [PATCH v2 0/5] bug: Provide toggle for BUG on data corruption

This adds a CONFIG to trigger BUG()s when the kernel encounters
unexpected data structure integrity as currently detected with

Specifically list operations have been a target for widening flaws to gain
"write anywhere" primitives for attackers, so this also consolidates the
debug checking to avoid code and check duplication (e.g. RCU list debug
was missing a check that got added to regular list debug). It also stops
manipulations when corruption is detected, since worsening the corruption
makes no sense. (Really, everyone should build with CONFIG_DEBUG_LIST
since the checks are so inexpensive.)

This is mostly a refactoring of similar code from PaX and Grsecurity,
along with MSM kernel changes by Stephen Boyd.

Along with the patches is a new lkdtm test to validate that setting
CONFIG_DEBUG_LIST actually does what is desired.



Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.