From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Monjalon Subject: Re: [PATCH v2] mem: poison memory when freed Date: Wed, 27 Mar 2019 11:26:28 +0100 Message-ID: <10293234.krj7TAs3ua@xps> References: <20190216015016.10426-1-stephen@networkplumber.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7Bit Cc: dev@dpdk.org To: Stephen Hemminger Return-path: Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) by dpdk.org (Postfix) with ESMTP id 691A05F72 for ; Wed, 27 Mar 2019 11:26:31 +0100 (CET) In-Reply-To: <20190216015016.10426-1-stephen@networkplumber.org> List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" 16/02/2019 02:50, Stephen Hemminger: > DPDK malloc library allows broken programs to work because > the semantics of zmalloc and malloc are the same. > > This patch enables a more secure model which will catch > (and crash) programs that reuse memory already freed if > RTE_MALLOC_DEBUG is enabled. > > Signed-off-by: Stephen Hemminger > Acked-by: Andrew Rybchenko > Reviewed-by: Anatoly Burakov Applied, thanks