From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com References: <1450755641-7856-1-git-send-email-laura@labbott.name> <1450755641-7856-7-git-send-email-laura@labbott.name> <567964F3.2020402@intel.com> <567986E7.50107@intel.com> From: Dave Hansen Message-ID: <56798851.60906@intel.com> Date: Tue, 22 Dec 2015 09:28:49 -0800 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Subject: Re: [kernel-hardening] [RFC][PATCH 6/7] mm: Add Kconfig option for slab sanitization To: Christoph Lameter Cc: kernel-hardening@lists.openwall.com, Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Laura Abbott , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Kees Cook List-ID: On 12/22/2015 09:24 AM, Christoph Lameter wrote: > On Tue, 22 Dec 2015, Dave Hansen wrote: >> Or are you just saying that we should use the poisoning *code* that we >> already have in slub? Using the _code_ looks like a really good idea, >> whether we're using it to write POISON_FREE, or 0's. Something like the >> attached patch? > > Why would you use zeros? The point is just to clear the information right? > The regular poisoning does that. It then allows you to avoid the zeroing at allocation time.