From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 46BD5C433EF for ; Mon, 13 Jun 2022 16:26:04 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D3A608D01A6; Mon, 13 Jun 2022 12:26:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id C9B2D8D01A1; Mon, 13 Jun 2022 12:26:03 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B150E8D01A6; Mon, 13 Jun 2022 12:26:03 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 9D1DE8D01A1 for ; Mon, 13 Jun 2022 12:26:03 -0400 (EDT) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay11.hostedemail.com (Postfix) with ESMTP id 6D94E80A74 for ; Mon, 13 Jun 2022 16:26:03 +0000 (UTC) X-FDA: 79573739406.06.05CA2B6 Received: from mail-pg1-f178.google.com (mail-pg1-f178.google.com [209.85.215.178]) by imf08.hostedemail.com (Postfix) with ESMTP id 0562B160093 for ; Mon, 13 Jun 2022 16:26:02 +0000 (UTC) Received: by mail-pg1-f178.google.com with SMTP id z14so1837847pgh.0 for ; Mon, 13 Jun 2022 09:26:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=wkb+MwOrUuF+HNd2u2CzHWqIJJzZwh4CpbRv5BFIGG8=; b=gKsruLw56RKY2FaeJAdSucX4UKrG/JulROQ/Lt1+qZSrG2XQGf0wzVUyvCtcoFligh qJmOkyGGmy/7pK9UO5EU/+sICRYUzDHUkudPv1xc+EN2bjAzDFf+UImJ1vRALiT8KoYL ZyaoQzhghBob9lWBHE2yo35TAYUbprZwEYaZQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=wkb+MwOrUuF+HNd2u2CzHWqIJJzZwh4CpbRv5BFIGG8=; b=VBSWNAYcHAZ2vkRVV4ykcmYxrMD7kRoqIEz4kKEcpq9XFAkE1dP+/3RXRKu4gMNxNf 8i/O1uQmCbE8VLVIXP2dVw28YCyRA/2tUf9cEsE2etyWS96is7ixKNd/wEKCSR/2BEXr g7UEBPq9iV4AWMnjVlFXBK/evj4V3g/8IedET3zTl9PEZSdzjAjlioXdp6Im+ZmC2qrX D2AXo7f4Ruyg39XKsWiz8oTbqrZXVdlpXzinY3LOxcjwMUyzOvG8RSh9rzQDcQ1rD52i 25EZTCjEYUy9Eidua5GRLGB1ZsumpEHmsthFikFFTKWdb/LEldmawUD995x9GvCns6ov LwfQ== X-Gm-Message-State: AOAM531hlY8zj2B96MvBrRJdjQ51NN3QEmUuWUtx0XsePXHUR6DdTCgx 8MdmMfQ8HRchurLxKvZ0qN+nPg== X-Google-Smtp-Source: ABdhPJxyTNae2p+FANYseTK5qabNBuM278c8Nc3c4pWqu8t/rD+fUEmy0SY3R0WtqX1gZiJQB6MOtQ== X-Received: by 2002:a05:6a00:4211:b0:51c:45e:532b with SMTP id cd17-20020a056a00421100b0051c045e532bmr61401pfb.10.1655137561925; Mon, 13 Jun 2022 09:26:01 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id cx9-20020a17090afd8900b001e0d4169365sm7600090pjb.17.2022.06.13.09.26.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Jun 2022 09:26:01 -0700 (PDT) From: Kees Cook To: willy@infradead.org Cc: Kees Cook , linux-mm@kvack.org, urezki@gmail.com, linux-xfs@vger.kernel.org, linux-hardening@vger.kernel.org, zlang@redhat.com Subject: Re: [PATCH 0/3] Fixes for usercopy Date: Mon, 13 Jun 2022 09:25:50 -0700 Message-Id: <165513754627.2848924.5682845219293339630.b4-ty@chromium.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220612213227.3881769-1-willy@infradead.org> References: <20220612213227.3881769-1-willy@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1655137563; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=wkb+MwOrUuF+HNd2u2CzHWqIJJzZwh4CpbRv5BFIGG8=; b=F/4ffiqFWOa+iyaBoc47Ecqr4Bly6aPr5xHNvlVCPFNBgbvCfx3ucrL7VJZF5VWTR3A8Vx 81jPrK8aDpauUNpG9C76VNDU+f2oDGd+xtSjWgY8jOCxoPCz97anpPbGXBURm3MOg7APJt tZ2cLu6BPBKiJoEifGGn+Q2fPq0yVTg= ARC-Authentication-Results: i=1; imf08.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=gKsruLw5; dmarc=pass (policy=none) header.from=chromium.org; spf=pass (imf08.hostedemail.com: domain of keescook@chromium.org designates 209.85.215.178 as permitted sender) smtp.mailfrom=keescook@chromium.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1655137563; a=rsa-sha256; cv=none; b=ciuquEbNbYKSNXOT8POOS24XWwxWS9F9ZaSbrZy0+lHnDMw+dBiI+RicdKGsShVMNaRuNo zrAzg8YXVg0ItB4/AcdHvBI3dtj1b7u0i2OHyapmuDmt5KLUYkaQhc0wJvHNGX6XsnJnoB t2wOnH58Sd5if+AiyZ58hIvtch0aCck= X-Stat-Signature: bqaqp7w7g1i3cam4u4ixnke63ac6q3ar X-Rspamd-Queue-Id: 0562B160093 X-Rspam-User: X-Rspamd-Server: rspam05 Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=gKsruLw5; dmarc=pass (policy=none) header.from=chromium.org; spf=pass (imf08.hostedemail.com: domain of keescook@chromium.org designates 209.85.215.178 as permitted sender) smtp.mailfrom=keescook@chromium.org X-HE-Tag: 1655137562-676902 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sun, 12 Jun 2022 22:32:24 +0100, Matthew Wilcox (Oracle) wrote: > Kees, I'm hoping you'll take these through your tree. I think they're > all reasonable fixes to go into 5.19. The first one is essential; > it fixes two different bugs that people have hit. > > Matthew Wilcox (Oracle) (3): > usercopy: Handle vm_map_ram() areas > usercopy: Cast pointer to an integer once > usercopy: Make usercopy resilient against ridiculously large copies > > [...] Applied to for-next/hardening, thanks! [1/3] usercopy: Handle vm_map_ram() areas https://git.kernel.org/kees/c/751ad8bdde7f [2/3] usercopy: Cast pointer to an integer once https://git.kernel.org/kees/c/de2ae8f5331a [3/3] usercopy: Make usercopy resilient against ridiculously large copies https://git.kernel.org/kees/c/630b2014e60e -- Kees Cook