lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <aTWotB5ev3q9VdXj@kernel.org>
Date: Sun, 7 Dec 2025 18:17:56 +0200
From: Mike Rapoport <rppt@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
	Joshua Hahn <joshua.hahnjy@...il.com>,
	Mike Rapoport <rppt@...nel.org>, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org
Subject: [GIT PULL] memblock: introduce check_pages boot parameter

Hi Linus,

The following changes since commit ac3fd01e4c1efce8f2c054cdeb2ddd2fc0fb150d:

  Linux 6.18-rc7 (2025-11-23 14:53:16 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/rppt/memblock tags/memblock-6.19-rc1

for you to fetch changes up to 83c8f7b5e194eaf3fb268c513e23e23e892de8ed:

  mm/mm_init: Introduce a boot parameter for check_pages (2025-12-04 19:40:25 +0200)

----------------------------------------------------------------
memblock: introduce check_pages boot parameter

... to decouple simple checks for page state on allocation and free from
CONFIG_DEBUG_VM.

check_pages parameter allows enabling page checking without building kernel
with CONFIG_DEBUG_VM or forcing init_on_{alloc, free} or other heavier
mechanisms.

----------------------------------------------------------------
Joshua Hahn (1):
      mm/mm_init: Introduce a boot parameter for check_pages

 Documentation/admin-guide/kernel-parameters.txt |  8 ++++++++
 mm/mm_init.c                                    | 10 +++++++++-
 2 files changed, 17 insertions(+), 1 deletion(-)

-- 
Sincerely yours,
Mike.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ