|
Message-Id: <1488827386-87193-1-git-send-email-keescook@chromium.org> Date: Mon, 6 Mar 2017 11:09:40 -0800 From: Kees Cook <keescook@...omium.org> To: kernel-hardening@...ts.openwall.com Cc: Kees Cook <keescook@...omium.org>, Andrew Morton <akpm@...ux-foundation.org>, Rik van Riel <riel@...hat.com>, "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>, Jakub Kicinski <jakub.kicinski@...ronome.com>, Viresh Kumar <viresh.kumar@...aro.org>, Ingo Molnar <mingo@...nel.org>, Thomas Gleixner <tglx@...utronix.de>, Dmitry Vyukov <dvyukov@...gle.com>, Olof Johansson <olof@...om.net>, Peter Zijlstra <peterz@...radead.org>, Josh Poimboeuf <jpoimboe@...hat.com>, linux-kernel@...r.kernel.org Subject: [PATCH 0/6] bug: further enhance use of BUG_ON_DATA_CORRUPTION This continues in applying the CHECK_DATA_CORRUPTION tests where appropriate, and pulling similar CONFIGs under the same check. Most notably, this adds the checks to refcount_t so that system builders can Oops their kernels when encountering a potential refcounter attack. (And so now the LKDTM tests for refcount issues pass correctly.) I'd love to get people's Acks in case this needs to go through the kspp tree instead of something else, like maybe -mm if that seems better. Thanks, -Kees
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.