Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 16 Aug 2016 20:37:26 -0700
From: Kees Cook <>
To: Henrique de Moraes Holschuh <>
Cc: "Paul E . McKenney" <>, Laura Abbott <>, 
	Steven Rostedt <>, Stephen Boyd <>, 
	Daniel Micay <>, Joe Perches <>, Arnd Bergmann <>, 
	Greg Kroah-Hartman <>, Josh Triplett <>, 
	Mathieu Desnoyers <>, Lai Jiangshan <>, 
	"Aneesh Kumar K.V" <>, 
	"Kirill A. Shutemov" <>, Michael Ellerman <>, 
	Dan Williams <>, Andrew Morton <>, 
	Ingo Molnar <>, Thomas Gleixner <>, Josef Bacik <>, 
	Andrey Ryabinin <>, Tejun Heo <>, 
	Nikolay Aleksandrov <>, Dmitry Vyukov <>, 
	LKML <>, 
	"" <>
Subject: Re: [PATCH v2 0/5] bug: Provide toggle for BUG on data corruption

On Tue, Aug 16, 2016 at 5:55 PM, Henrique de Moraes Holschuh
<> wrote:
> On Tue, 16 Aug 2016, Kees Cook wrote:
>> This adds a CONFIG to trigger BUG()s when the kernel encounters
>> unexpected data structure integrity as currently detected with
>> Specifically list operations have been a target for widening flaws to gain
>> "write anywhere" primitives for attackers, so this also consolidates the
>> debug checking to avoid code and check duplication (e.g. RCU list debug
>> was missing a check that got added to regular list debug). It also stops
>> manipulations when corruption is detected, since worsening the corruption
>> makes no sense. (Really, everyone should build with CONFIG_DEBUG_LIST
>> since the checks are so inexpensive.)
> Well, maybe it wants a name that it looks like something that should be
> enabled by default on production kernels?

Yeah, that very well be true. I'd currently like to avoid CONFIG name
churn, but I've added it to my list of CONFIGs to rename (along with


Kees Cook
Nexus Security

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.