diff options
author | Kees Cook <keescook@chromium.org> | 2022-03-24 15:57:25 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2022-03-24 15:57:25 -0700 |
commit | ef3e787c21d1efcd297f0cf2e9535e76188fb831 (patch) | |
tree | 54625db836e2ddb7aa5fc8de24757cf954df68d0 /security/Kconfig | |
parent | afcf5441b9ff22ac57244cd45ff102ebc2e32d1a (diff) | |
download | lwn-ef3e787c21d1efcd297f0cf2e9535e76188fb831.tar.gz lwn-ef3e787c21d1efcd297f0cf2e9535e76188fb831.zip |
usercopy: Disable CONFIG_HARDENED_USERCOPY_PAGESPAN
CONFIG_HARDENED_USERCOPY_PAGESPAN has been mostly broken for a while,
and it has become hard to ignore with some recent scsi changes[1].
While there is a more complete series to replace it with better checks[2],
it should have more soak time in -next. Instead, disable the config now,
with the expectation that it will be fully replaced in the next kernel
release.
[1] https://lore.kernel.org/lkml/20220324064846.GA12961@lst.de/
[2] https://lore.kernel.org/linux-hardening/20220110231530.665970-1-willy@infradead.org/
Suggested-by: Christoph Hellwig <hch@lst.de>
Cc: "Matthew Wilcox (Oracle)" <willy@infradead.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'security/Kconfig')
-rw-r--r-- | security/Kconfig | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/Kconfig b/security/Kconfig index 0b847f435beb..88a0bc8c592b 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -166,7 +166,7 @@ config HARDENED_USERCOPY config HARDENED_USERCOPY_PAGESPAN bool "Refuse to copy allocations that span multiple pages" depends on HARDENED_USERCOPY - depends on EXPERT + depends on BROKEN help When a multi-page allocation is done without __GFP_COMP, hardened usercopy will reject attempts to copy it. There are, |