> -----Original Message-----
> From: Christoph Hellwig [mailto:h...@infradead.org]
> Sent: Thursday, October 6, 2016 9:32 AM
> To: Roberts, William C <william.c.robe...@intel.com>
> Cc: kernel-harden...@lists.openwall.com; cor...@lwn.net; linux-
> d...@vger.kernel.org; linux-kernel@vger.kernel.org
> Subject: Re: [PATCH] printk: introduce kptr_restrict level 3
> 
> On Wed, Oct 05, 2016 at 02:04:46PM -0400, william.c.robe...@intel.com wrote:
> > From: William Roberts <william.c.robe...@intel.com>
> >
> > Some out-of-tree modules do not use %pK and just use %p, as it's the
> > common C paradigm for printing pointers. Because of this,
> > kptr_restrict has no affect on the output and thus, no way to contain
> > the kernel address leak.
> 
> So what?  We a) don't care about out of tree modules and b) you could just 
> triviall
> fix them up if you care.

Out of tree modules still affect core kernel security. I would also bet money, 
that somewhere
In-tree someone has put a %p when they wanted a %pK. So this method is just 
quite error
prone. We currently have a blacklist approach versus whitelist.

> 
> No need to bloat the kernel with crap like this.

It's unconstructive comments like this that do the whole community harm. Notice 
how
responses from Kees Cook were aimed at finding a different solution to the 
problem and were
very constructive. As far as "bloating" goes, it really didn't change a whole 
lot, most of it was moved
lines, and adds maybe a few lines of code.

Reply via email to