lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <81a4ed8c-7758-b295-e68b-ecc0372cc956@gentwo.org>
Date: Wed, 28 Aug 2024 08:37:28 -0700 (PDT)
From: "Christoph Lameter (Ampere)" <cl@...two.org>
To: Kees Cook <kees@...nel.org>
cc: Vlastimil Babka <vbabka@...e.cz>, 
    Linus Torvalds <torvalds@...ux-foundation.org>, 
    Pekka Enberg <penberg@...nel.org>, David Rientjes <rientjes@...gle.com>, 
    Joonsoo Kim <iamjoonsoo.kim@....com>, 
    Andrew Morton <akpm@...ux-foundation.org>, 
    Roman Gushchin <roman.gushchin@...ux.dev>, 
    Hyeonggon Yoo <42.hyeyoo@...il.com>, 
    "Gustavo A . R . Silva" <gustavoars@...nel.org>, 
    Bill Wendling <morbo@...gle.com>, Justin Stitt <justinstitt@...gle.com>, 
    Jann Horn <jannh@...gle.com>, 
    Przemek Kitszel <przemyslaw.kitszel@...el.com>, 
    Marco Elver <elver@...gle.com>, linux-mm@...ck.org, 
    Nathan Chancellor <nathan@...nel.org>, 
    Nick Desaulniers <ndesaulniers@...gle.com>, linux-kernel@...r.kernel.org, 
    llvm@...ts.linux.dev, linux-hardening@...r.kernel.org
Subject: Re: [PATCH v3] slab: Introduce kmalloc_obj() and family

On Tue, 27 Aug 2024, Kees Cook wrote:

> > Since that could be feasible to apply only if Linus ran that directly
> > himself, including him now. Because doing it any other way would leave us
> > semi-converted forever and not bring the full benefits?
>
> Right -- I'd want to do a mass conversion and follow it up with any
> remaining ones. There are a lot in the style of "return k*alloc(...)"
> for example.

I believe Andrew has dealt with these issues in the past?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ