• K
    usercopy: Allow strict enforcement of whitelists · 2d891fbc
    Kees Cook 提交于
    This introduces CONFIG_HARDENED_USERCOPY_FALLBACK to control the
    behavior of hardened usercopy whitelist violations. By default, whitelist
    violations will continue to WARN() so that any bad or missing usercopy
    whitelists can be discovered without being too disruptive.
    
    If this config is disabled at build time or a system is booted with
    "slab_common.usercopy_fallback=0", usercopy whitelists will BUG() instead
    of WARN(). This is useful for admins that want to use usercopy whitelists
    immediately.
    Suggested-by: NMatthew Garrett <mjg59@google.com>
    Signed-off-by: NKees Cook <keescook@chromium.org>
    2d891fbc
slab.h 22.0 KB