[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5679773B.6040903@intel.com>
Date: Tue, 22 Dec 2015 08:15:55 -0800
From: Dave Hansen <dave.hansen@...el.com>
To: kernel-hardening@...ts.openwall.com,
Laura Abbott <laura@...bott.name>
Cc: Pekka Enberg <penberg@...nel.org>,
David Rientjes <rientjes@...gle.com>,
Joonsoo Kim <iamjoonsoo.kim@....com>,
Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org,
linux-kernel@...r.kernel.org, Kees Cook <keescook@...omium.org>
Subject: Re: [kernel-hardening] Re: [RFC][PATCH 0/7] Sanitization of slabs
based on grsecurity/PaX
On 12/22/2015 08:08 AM, Christoph Lameter wrote:
> 2. Add a mechanism that ensures that GFP_ZERO is set for each allocation.
> That way every object you retrieve is zeroed and thus you have implied
> sanitization. This also can be done in a rather simple way by changing
> the GFP_KERNEL etc constants to include __GFP_ZERO depending on a
> Kconfig option. Or add some runtime setting of the gfp flags somewhere.
That's a more comprehensive barrier to leaking information than what we
have now, and it would _also_ cover a big chunk of normal
alloc_page()-style allocations which would be nice.
But, doing this on the allocation side is less comprehensive than doing
at free() time. We (ideally) want to make sure that unallocated memory
at rest does not contain sensitive contents.
Also, the free path _tends_ to be a bit less performance-critical than
the allocation side. For instance, I think we generally care about
fork() performance a lot more than exit(). :)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists