[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202402121104.4A87C47C87@keescook>
Date: Mon, 12 Feb 2024 11:04:44 -0800
From: Kees Cook <keescook@...omium.org>
To: Marco Elver <elver@...gle.com>
Cc: "Gustavo A. R. Silva" <gustavoars@...nel.org>,
linux-hardening@...r.kernel.org, linux-kernel@...r.kernel.org,
Dmitry Vyukov <dvyukov@...gle.com>,
Alexander Potapenko <glider@...gle.com>, kasan-dev@...glegroups.com,
Matthieu Baerts <matttbe@...nel.org>,
Jakub Kicinski <kuba@...nel.org>
Subject: Re: [PATCH] hardening: Enable KFENCE in the hardening config
On Mon, Feb 12, 2024 at 02:01:09PM +0100, Marco Elver wrote:
> KFENCE is not a security mitigation mechanism (due to sampling), but has
> the performance characteristics of unintrusive hardening techniques.
> When used at scale, however, it improves overall security by allowing
> kernel developers to detect heap memory-safety bugs cheaply.
>
> Link: https://lkml.kernel.org/r/79B9A832-B3DE-4229-9D87-748B2CFB7D12@kernel.org
> Cc: Matthieu Baerts <matttbe@...nel.org>
> Cc: Jakub Kicinski <kuba@...nel.org>
> Signed-off-by: Marco Elver <elver@...gle.com>
Thanks! Applied to my for-next/hardening tree.
https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git/commit/?h=for-next/hardening&id=1f82cb2f3859540120e990a79abfee8151ea6b93
-Kees
--
Kees Cook
Powered by blists - more mailing lists