|
Message-ID: <5679773B.6040903@intel.com> Date: Tue, 22 Dec 2015 08:15:55 -0800 From: Dave Hansen <dave.hansen@...el.com> To: kernel-hardening@...ts.openwall.com, Laura Abbott <laura@...bott.name> Cc: Pekka Enberg <penberg@...nel.org>, David Rientjes <rientjes@...gle.com>, Joonsoo Kim <iamjoonsoo.kim@....com>, Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org, linux-kernel@...r.kernel.org, Kees Cook <keescook@...omium.org> Subject: Re: Re: [RFC][PATCH 0/7] Sanitization of slabs based on grsecurity/PaX On 12/22/2015 08:08 AM, Christoph Lameter wrote: > 2. Add a mechanism that ensures that GFP_ZERO is set for each allocation. > That way every object you retrieve is zeroed and thus you have implied > sanitization. This also can be done in a rather simple way by changing > the GFP_KERNEL etc constants to include __GFP_ZERO depending on a > Kconfig option. Or add some runtime setting of the gfp flags somewhere. That's a more comprehensive barrier to leaking information than what we have now, and it would _also_ cover a big chunk of normal alloc_page()-style allocations which would be nice. But, doing this on the allocation side is less comprehensive than doing at free() time. We (ideally) want to make sure that unallocated memory at rest does not contain sensitive contents. Also, the free path _tends_ to be a bit less performance-critical than the allocation side. For instance, I think we generally care about fork() performance a lot more than exit(). :)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.