[PATCH v8 1/2] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Andrew Morton
akpm at linux-foundation.org
Wed Jun 26 23:28:35 UTC 2019
On Wed, 26 Jun 2019 14:19:42 +0200 Alexander Potapenko <glider at google.com> wrote:
> v8:
> - addressed comments by Michal Hocko: revert kernel/kexec_core.c and
> apply initialization in dma_pool_free()
> - disable init_on_alloc/init_on_free if slab poisoning or page
> poisoning are enabled, as requested by Qian Cai
> - skip the redzone when initializing a freed heap object, as requested
> by Qian Cai and Kees Cook
> - use s->offset to address the freeptr (suggested by Kees Cook)
> - updated the patch description, added Signed-off-by: tag
v8 failed to incorporate
https://ozlabs.org/~akpm/mmots/broken-out/mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options-fix.patch
and
https://ozlabs.org/~akpm/mmots/broken-out/mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options-fix-2.patch
it's conventional to incorporate such fixes when preparing a new
version of a patch.
More information about the Linux-security-module-archive
mailing list